Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Vacca, John R  (5)
  • Gilman, Evan  (4)
  • Computer networks ; Security measures  (9)
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly
    Language: English
    Pages: 1 online resource (1 streaming video file (6 min., 16 sec.)) , digital, sound, color
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "Once you know what a zero trust network is, and what the advantages and disadvantages of moving to this model are, the next step is to understand some of the common challenges that you will face in implementing zero trust as a security model. Evan Gilman and Doug Barth discuss these challenges, and give suggestions on how to overcome them. You will get tips on why to involve more than just your security team, why implementing policy as code is important, understanding why you should evaluate policies for their impact and value, and the overall scale of change involved in moving from a perimeter model to a zero trust model."--Resource description page.
    Note: Title from title screen (viewed September 7, 2017). - Date of publication from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That's an all-too-familiar scenario today. With this practical book, you'll learn the principles behind zero trust architecture, along with details necessary to implement it. The Zero Trust Model treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you'll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. Understand how perimeter-based defenses have evolved to become the broken model we use today Explore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty) Get example configuration for open source tools that you can use to build a zero trust network Learn how to migrate from a perimeter-based network to a zero trust network in production
    Note: Includes index. - Description based on online resource; title from title page (viewed June 26, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly
    Language: English
    Pages: 1 online resource (1 streaming video file (6 min., 7 sec.)) , digital, sound, color
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "In this video, Doug Barth and Evan Gilman describe what a zero trust network is, and why it is the natural evolution from the current best practice security models. Current network infrastructures are designed to protect your internal network with a firewall, and everything behind that firewall being "trusted" by default. zero trust networks are based on the philosophy that no network is trusted, be it external or internal. In this video, Doug and Evan discuss topics such as why it is important to move to a zero trust network model, what is driving the need to evolve security models, and what some of the benefits are for this type of network security model."--Resource description page.
    Note: Title from title screen (viewed August 31, 2017). - Date of publication from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly
    Language: English
    Pages: 1 online resource (1 streaming video file (4 min., 26 sec.)) , digital, sound, color
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "Zero trust networks are an evolution of current security models; but why should you care, and how can they help you? In this video Doug Barth and Evan Gilman will give you an overview of the advantages that a zero trust model can offer your organization; as well as the disadvantages that you will have to overcome to implement them."--Resource description page.
    Note: Title from title screen (viewed August 31, 2017). - Date of publication from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780124166950 , 0124166954
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Keywords: Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed Dec. 5, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Waltham, MA : Syngress/Elsevier
    ISBN: 9780124166943 , 0124166946
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Keywords: Computer security ; Management ; Electronic data processing departments ; Security measures ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else Comprehensive coverage by leading experts allows the reader to put current technologies to work Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed Dec. 5, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Waltham, MA : Syngress/Elsevier
    ISBN: 9780124200470 , 0124200478
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Cyberterrorism ; Prevention ; Electronic books ; Computer networks ; Security measures ; Computer security ; Management ; Information technology ; Security measures ; Data protection ; Electronic books ; local
    Abstract: This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: • Checklists throughout each chapter to gauge understanding • Chapter Review Questions/Exercises and Case Studies • Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc. Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertise Comprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpoints Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Waltham, Mass. : Morgan Kaufmann
    ISBN: 9780123946126 , 0123946123
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Penetration testing (Computer security) ; Electronic books ; local ; Electronic books
    Abstract: The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more. Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Burlington, MA : Syngress/Elsevier
    ISBN: 9781597495356
    Language: English
    Pages: 1 online resource (xxxv, 368 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local ; Electronic books
    Abstract: Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area. Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...