No ficción
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
© 2024 Ascent Audio (Audiolibro ): 9781663735584
Fecha de lanzamiento
Audiolibro : 4 de junio de 2024
No ficción
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
© 2024 Ascent Audio (Audiolibro ): 9781663735584
Fecha de lanzamiento
Audiolibro : 4 de junio de 2024
Descubre un mundo infinito de historias
Aún no hay reseñas
Descarga la app para unirte a la conversación y agregar reseñas.
Español
Colombia