Project zero trust: A story about a strategy for aligning security and the business (Record no. 1782)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01976nam a2200229 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250802154351.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250802b2023|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119884859 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 364.16 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Finney, George |
| Relator term | Author |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Kindervag, John |
| Relator term | Co-Author |
| 245 ## - TITLE STATEMENT | |
| Title | Project zero trust: A story about a strategy for aligning security and the business |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2023. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xxiii, 196p. |
| 500 ## - GENERAL NOTE | |
| General note | Implement Zero Trust initiatives efficiently and effectively<br/><br/>In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director.<br/><br/>Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find:<br/><br/>Concrete strategies for aligning your security practices with the business<br/>Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment<br/>Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices<br/>Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | The Case for Zero Trust and Zero Trust Is a Strategy |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Zero Trust DevOps and Zero Trust SOC |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cloudy with a Chance of Trust |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=10322574 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 364.16 | EB0206 | e-Books |