Zero trust networks : building secure systems in untrusted network /
"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you t...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Electronic Audio |
Language: | English |
Published: |
[Rego Park, New York] :
Ascent Audio
2024
|
Edition: | 2nd edition. |
Subjects: | |
Online Access: |
Streaming audio (Wentworth users only) |