كتب واقعية
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
© 2024 Ascent Audio (دفتر الصوت ): 9781663735584
تاريخ الإصدار
دفتر الصوت : ٤ يونيو ٢٠٢٤
كتب واقعية
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
© 2024 Ascent Audio (دفتر الصوت ): 9781663735584
تاريخ الإصدار
دفتر الصوت : ٤ يونيو ٢٠٢٤
خطوة إلى عالم لا حدود له من القصص
لا توجد تعليقات بعد
قم بتنزيل التطبيق للانضمام إلى المحادثة وإضافة مراجعات.
عربي
مصر