000 03705nam a22005655i 4500
001 978-3-031-63781-0
003 DE-He213
005 20250516160058.0
007 cr nn 008mamaa
008 240703s2024 sz | s |||| 0|eng d
020 _a9783031637810
_9978-3-031-63781-0
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
100 1 _aH L, Gururaj.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSecuring the Future
_h[electronic resource] :
_bIntroduction to Zero Trust in Cybersecurity /
_cby Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXV, 87 p. 17 illus., 16 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computational Intelligence,
_x2625-3712
505 0 _aChapter 1. Foundations of Cybersecurity -- Chapter 2. Introduction to Zero Trust -- Chapter 3. Implementing Zero Trust Networks -- Chapter 4. Zero Trust for Cloud -- Chapter 5. Compliance and Governance in Zero Trust -- Chapter 6. Applications & Case Studies of Successful Zero Trust -- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security -- Chapter 8. Challenges and Future Scope.
520 _aThis book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to practical insights on implementing Zero Trust networks and extending its principles to cloud environments. It addresses the crucial aspects of compliance and governance within the Zero Trust framework and provides real-world applications and case studies showcasing successful Zero Trust implementations. Furthermore, it underscores the importance of cultivating Zero Trust awareness throughout organizational culture to fortify security measures effectively. Highlighting both the challenges and the future potential of Zero Trust, this book offers a roadmap for organizations seeking to bolster their cybersecurity defenses amidst an evolving threat landscape.
541 _fUABC ;
_cPerpetuidad
650 0 _aComputational intelligence.
650 0 _aData protection.
650 1 4 _aComputational Intelligence.
650 2 4 _aData and Information Security.
700 1 _aM, Spoorthi.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aRavi, Vinayakumar.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aJ, Shreyas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aRoy, Kumar Sekhar.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031637803
776 0 8 _iPrinted edition:
_z9783031637827
830 0 _aSpringerBriefs in Computational Intelligence,
_x2625-3712
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-63781-0
912 _aZDB-2-INR
912 _aZDB-2-SXIT
942 _cLIBRO_ELEC
999 _c275569
_d275568