Inicio > > Redes y comunicaciones informáticas > Zero-trust - An Introduction
Zero-trust - An Introduction

Zero-trust - An Introduction

Tom Madsen

84,34 €
IVA incluido
Disponible
Editorial:
Taylor & Francis Ltd
Año de edición:
2024
Materia
Redes y comunicaciones informáticas
ISBN:
9788770228534
84,34 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

The book provides you with information on how to implement and manage a zero-trust architecture.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...

Otros libros del autor

  • Security Architecture - How & Why
    Tom Madsen
    Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because...
  • The Art of War for Computer Security
    Tom Madsen
    In this book the author draws inspiration from Sun Tzu’s Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an orig...
    Disponible

    172,42 €

  • Relentless
    Tom Madsen
    In 2014, a terrible nightmare became real for Tom Madsen and his wife Marilene: a lump on their son Kevin’s leg was diagnosed as sarcoma. Kevin soldiers on through debilitating treatments for three years, but finally passes just shy of his 20th birthday. But Kevin refuses to go away, and he has shown up in numerous ways since he passed. In Relentless: From Both Sides of the Vei...
    Disponible

    19,18 €

  • The Art of War for Computer Security
    Tom Madsen
    In this book the author draws inspiration from Sun Tzu’s Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an orig...