Browse Results

Showing 56,151 through 56,175 of 56,179 results

The Zero Trust Framework: Threat Hunting & Quantum Mechanics

by Ravindra Das

The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.

The Zero Trust Framework and Privileged Access Management (PAM)

by Ravindra Das

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.

Zero Trust Journey Across the Digital Estate

by Abbas Kudrati Binil A. Pillai

"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that show us that our past approaches, while earnest in their efforts have not stopped attackers. Zero Trust strategically focuses on and systematically removes the power and initiatives hackers and adversaries need to win as they circumvent security controls. This book will help you and your organization have a better understanding of what Zero Trust really is, it's history, and to gain prescriptive knowledge that will help you and your business finally begin beating the adversaries in the chess match that is cyber security strategy." Dr. Chase Cunningham (aka Dr. Zero Trust), Cyberware Expert Today’s organizations require a new security approach that effectively adapts to the challenges of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they are located. Zero Trust is increasingly becoming the critical security approach of choice for many enterprises and governments; however, security leaders often struggle with the significant shifts in strategy and architecture required to holistically implement Zero Trust. This book seeks to provide an end-to-end view of the Zero Trust approach across organizations’ digital estates that includes strategy, business imperatives, architecture, solutions, human elements, and implementation approaches that could enhance these organizations' success in learning, adapting, and implementing Zero Trust. The book concludes with a discussion of the future of Zero Trust in areas such as artificial intelligence, blockchain technology, operational technology (OT), and governance, risk, and compliance. The book is ideal for business decision makers, cybersecurity leaders, security technical professionals, and organizational change agents who want to modernize their digital estate with the Zero Trust approach.

Zero Trust Networks: Building Secure Systems in Untrusted Networks

by Doug Barth Evan Gilman

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it.The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.Understand how perimeter-based defenses have evolved to become the broken model we use todayExplore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty)Get example configuration for open source tools that you can use to build a zero trust networkLearn how to migrate from a perimeter-based network to a zero trust network in production

Zero Trust Networks

by Razi Rais Christina Morillo Evan Gilman Doug Barth

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agentsUnderstand how this model embeds security within the system's operation, with guided scenarios at the end of each chapterMigrate from a perimeter-based network to a zero trust network in productionExplore case studies that provide insights into organizations' zero trust journeysLearn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others

Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers

by Sreejith Keeriyattil

Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center.Author Sreerjith Keeriyattil teaches you how micro-segmentation can be used to protect east-west traffic. Insight is provided into working with Service Composer and using NSX REST API to automate firewalls. You will analyze flow and security threats to monitor firewalls using VMware Log and see how Packet Flow works with VMware NSX micro-segmentation. The information presented in Zero Trust Networks with VMware NSX allows you to study numerous attack scenarios and strategies to stop these attacks, and know how VMware Air Watch can further improve your architecture.What You Will LearnKnow how micro-segmentation works and its benefitsImplement VMware-distributed firewallsAutomate security policies Integrate IPS/IDS with VMware NSXAnalyze your firewall's configurations, rules, and policiesWho This Book Is ForExperienced VMware administrators and security administrators who have an understanding of data center architecture and operations

Zero Trust Security: An Enterprise Guide

by Jason Garbis Jerry W. Chapman

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.Zero Trust security has become a major industry trend, and yet there still is uncertainty about what it means. Zero Trust is about fundamentally changing the underlying philosophy and approach to enterprise security—moving from outdated and demonstrably ineffective perimeter-centric approaches to a dynamic, identity-centric, and policy-based approach.Making this type of shift can be challenging. Your organization has already deployed and operationalized enterprise security assets such as Directories, IAM systems, IDS/IPS, and SIEM, and changing things can be difficult. Zero Trust Security uniquely covers the breadth of enterprise security and IT architectures, providing substantive architectural guidance and technical analysis with the goal of accelerating your organization‘s journey to Zero Trust. What You Will Learn Understand Zero Trust security principles and why it is critical to adopt themSee the security and operational benefits of Zero TrustMake informed decisions about where, when, and how to apply Zero Trust security architecturesDiscover how the journey to Zero Trust will impact your enterprise and security architectureBe ready to plan your journey toward Zero Trust, while identifying projects that can deliver immediate security benefits for your organization Who This Book Is ForSecurity leaders, architects, and practitioners plus CISOs, enterprise security architects, security engineers, network security architects, solution architects, and Zero Trust strategists

Zero Trust Sicherheit: Ein Leitfaden für Unternehmen

by Jason Garbis Jerry W. Chapman

Verstehen Sie, wie Zero-Trust-Sicherheit in Ihr Unternehmen integriert werden kann und sollte.Dieses Buch deckt die Komplexität von Unternehmensumgebungen ab und liefert die realistischen Anleitungen und Anforderungen, die Ihr Sicherheitsteam benötigt, um eine Reise zu Zero Trust erfolgreich zu planen und auszuführen und gleichzeitig mehr Wert aus Ihrer bestehenden Unternehmenssicherheitsarchitektur zu ziehen.Nach der Lektüre dieses Buches werden Sie in der Lage sein, eine glaubwürdige und vertretbare Zero-Trust-Sicherheitsarchitektur für Ihr Unternehmen zu entwerfen und eine schrittweise Umstellung zu implementieren, die zu deutlich verbesserter Sicherheit und optimierten Abläufen führt.Zero Trust Sicherheit hat sich zu einem wichtigen Branchentrend entwickelt, und dennoch herrscht immer noch Unsicherheit darüber, was es bedeutet.Bei Zero Trust geht es darum, die zugrundeliegende Philosophie und den Ansatz für die Unternehmenssicherheit grundlegend zu ändern - weg von veralteten und nachweislich ineffektiven perimeterzentrierten Ansätzen hin zu einem dynamischen, identitätszentrierten und richtlinienbasierten Ansatz.Diese Art von Umstellung kann eine Herausforderung sein. Ihr Unternehmen hat bereits Sicherheitsressourcen wie Verzeichnisse, IAM-Systeme, IDS/IPS und SIEM implementiert und in Betrieb genommen, und es kann schwierig sein, dies zu ändern. Zero Trust Sicherheit deckt die gesamte Bandbreite der Unternehmenssicherheit und IT-Architekturen ab und bietet fundierte architektonische Anleitungen und technische Analysen mit dem Ziel, den Weg Ihres Unternehmens zu Zero Trust zu beschleunigen.Was Sie lernen werdenSie verstehen die Sicherheitsprinzipien von Zero Trust und warum es wichtig ist, diese zu übernehmenErkennen der Sicherheits- und Betriebsvorteile von Zero TrustTreffen Sie fundierte Entscheidungen darüber, wo, wann und wie Sie Zero Trust Sicherheitsarchitekturen einsetzenEntdecken Sie, wie sich der Weg zu Zero Trust auf Ihr Unternehmen und Ihre Sicherheitsarchitektur auswirken wirdSie sind in der Lage, Ihre Reise in Richtung Zero Trust zu planen und gleichzeitig Projekte zu identifizieren, die Ihrem Unternehmen unmittelbare Sicherheitsvorteile bringen können.Für wen ist dieses Buch gedacht?Sicherheitsverantwortliche, -architekten und -praktiker sowie CISOs, Sicherheitsarchitekten in Unternehmen, Sicherheitsingenieure, Netzwerksicherheitsarchitekten, Lösungsarchitekten und Zero-Trust-Strategen

Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications

by Lin Xiao Lei Jia

Zeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN methods for solving an array of computational problems Zeroing Neural Networks (ZNN) have become essential tools for solving discretized sensor-driven time-varying matrix problems in engineering, control theory, and on-chip applications for robots. Building on the original ZNN model, finite-time zeroing neural networks (FTZNN) enable efficient, accurate, and predictive real-time computations. Setting up discretized FTZNN algorithms for different time-varying matrix problems requires distinct steps. Zeroing Neural Networks provides in-depth information on the finite-time convergence of ZNN models in solving computational problems. Divided into eight parts, this comprehensive resource covers modeling methods, theoretical analysis, computer simulations, nonlinear activation functions, and more. Each part focuses on a specific type of time-varying computational problem, such as the application of FTZNN to the Lyapunov equation, linear matrix equation, and matrix inversion. Throughout the book, tables explain the performance of different models, while numerous illustrative examples clarify the advantages of each FTZNN method. In addition, the book: Describes how to design, analyze, and apply FTZNN models for solving computational problems Presents multiple FTZNN models for solving time-varying computational problems Details the noise-tolerance of FTZNN models to maximize the adaptability of FTZNN models to complex environments Includes an introduction, problem description, design scheme, theoretical analysis, illustrative verification, application, and summary in every chapter Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications is an essential resource for scientists, researchers, academic lecturers, and postgraduates in the field, as well as a valuable reference for engineers and other practitioners working in neurocomputing and intelligent control.

ZeroMQ

by Faruk Akgul

A practical, step-by-step example-rich tutorial.If you are a C developer who wants to learn about ZeroMQ, this book is for you. It is assumed that the reader has C experience at some level but prior ZeroMQ knowledge is not expected.

ZeroMQ: Messaging for Many Applications

by Pieter Hintjens

<p>Discover why ZeroMQ is rapidly becoming the programming framework of choice for exchanging messages between systems. With this practical, fast-paced guide, you&#8217;ll learn how to use this lightweight and highly flexible networking tool for message passing in clusters, the cloud, and other multi-system environments. Created by ZeroMQ maintainer Pieter Hintjens and volunteers from the framework&#8217;s community, this book takes you on a tour of different real-world applications, with extended examples in C.</p>

Zhang Functions and Various Models

by Yunong Zhang Dongsheng Guo

This book focuses on solving different types of time-varying problems. It presents various Zhang dynamics (ZD) models by defining various Zhang functions (ZFs) in real and complex domains. It then provides theoretical analyses of such ZD models and illustrates their results. It also uses simulations to substantiate their efficacy and show the feasibility of the presented ZD approach (i. e. , different ZFs leading to different ZD models), which is further applied to the repetitive motion planning (RMP) of redundant robots, showing its application potential.

Zhang Time Discretization (ZTD) Formulas and Applications

by Yunong Zhang Jinjin Guo

This book aims to solve the discrete implementation problems of continuous-time neural network models while improving the performance of neural networks by using various Zhang Time Discretization (ZTD) formulas.The authors summarize and present the systematic derivations and complete research of ZTD formulas from special 3S-ZTD formulas to general NS-ZTD formulas. These finally lead to their proposed discrete-time Zhang neural network (DTZNN) algorithms, which are more efficient, accurate, and elegant. This book will open the door to scientific and engineering applications of ZTD formulas and neural networks, and will be a major inspiration for studies in neural network modeling, numerical algorithm design, prediction, and robot manipulator control.The book will benefit engineers, senior undergraduates, graduate students, and researchers in the fields of neural networks, computer mathematics, computer science, artificial intelligence, numerical algorithms, optimization, robotics, and simulation modeling.

The Zimbabwean Crisis after Mugabe: Multidisciplinary Perspectives (Routledge Contemporary Africa)

by Tendai Mangena

This book examines the ways in which political discourses of crisis and ‘newness’ are (re)produced, circulated, naturalised, received and contested in Post-Mugabe Zimbabwe. Going beyond the ordinariness of conventional political, human and social science methods, the book offers new and engaging multi-disciplinary approaches that treat discourse and language as important sites to encounter the politics of contested representations of the Zimbabwean crisis in the wake of the 2017 coup. The book centres discourse on new approaches to contestations around the discursive framing of various aspects of the socio-economic and political crisis related to significant political changes in Zimbabwe post-2017. Contributors in this volume, most of whom experienced the complex transition first-hand, examine some of the ways in which language functions as a socio-cultural and political mechanism for creating imaginaries, circulating, defending and contesting conceptions, visions, perceptions and knowledges of the post-Mugabe turn in the Zimbabwean crisis and its management by the "New Dispensation". This book will be of interest to scholars of African studies, postcolonial studies, language/discourse studies, African politics and culture.

Zimbra Implement, Administer and Manage

by David Touitou Marty Resnick

This is a compact Administrators Guide. It is friendly, and contains plenty of step-by-step instructions for installation and configuration of Zimbra as well as useful references and checklists. Administrators working with Zimbra on Linux or Mac OS X. Administrators who want to set up Zimbra for use in small/medium businesses.

ZK Developer's Guide

by Jurgen Schumacher Markus Stäuble

ZK is an open-source web development framework that enables web applications to have the rich user experiences and low development costs that desktop applications have had for years. ZK includes an Ajax-based event-driven engine, rich sets of XML User Interface Language (XUL) and XHTML components, and a markup language. The ZK rich client framework takes the so-called server-centric approach: the content synchronization of components and the event pipelining between clients and servers are automatically done by the engine and Ajax plumbing codes are completely transparent to web application developers. Therefore, the end users get rich user interfaces with similar engaged interactivity and responsiveness to that of desktop applications, while for programmers, development remains similar in simplicity to that of desktop applications. This book is a Developer's Guide that steps you through the ZK framework with examples. It starts with installing and configuring ZK and takes you on to integrate it with other frameworks. By the time you are through the book you will be able to build an application on your own.

Zoho For Dummies

by Steven Holzner

A great way to get started on this new, FREE, Web-based productivity and collaboration toolZoho is a very cool-and free-alternative to Microsoft Office. Known as "cloud" computing because it's totally Web-based, Zoho provides 18 different applications to help you write documents, create spreadsheets, send e-mail, and much more. People love it, but what it doesn't offer are extensive help files, so that's where this practical book comes in.Zoho For Dummies shows you how to use Zoho's most widely used applications, including Zoho Writer, Zoho Notebook, Zoho Show, Zoho Sheet, Zoho DB, Zoho Mail, Zoho Planner, Zoho CRM, and Zoho Projects. You'll get thoroughly up to speed on all common tasks and discover enough tips and tricks to get you power-using Zoho in no time.Zoho is a free, Web-based alternative to Microsoft Office launched in 2007; it is considered to be "cloud computing" because it is categorized as Software as a Service (SaaS) and Web-basedThe book guides you through common tasks and provides tips and tricks to maximize your productivity and minimize hassleCovers Zoho Writer, Zoho Notebook, Zoho Show, Zoho Sheet, Zoho DB, Zoho Mail, Zoho Planner, Zoho CRM, and Zoho ProjectsAlso provides information about sharing content, scheduling, and moreGet your head in the clouds with this friendly guide to the exciting new Zoho "cloud" alternative to Microsoft Office.

Zoho One Essentials: Mastering Zoho CRM

by Karen S. Fredricks

Reap the competitive benefits of Zoho, one of the best customer relationship management (CRM) solutions on the market today.Learn How To:>Store complete contact information, including name, company, phone numbers, mailing addresses, and e-mail addresses.>Record dated notes for each of your contacts so that you can easily keep track of meaningful conversations and activities. This feature is handy for those of us who forget things on occasion.>Keep a calendar that is cross-referenced with the appropriate contact so that you have a complete record of all interactions that you’ve had—or will have—with a contact.>Access reports and dashboards so that you can glean insight into your business based on the information in your database.>Merge your contact information into templates you create for marketing campaigns and other purposes. You can send those merged documents via snail mail, fax, or e-mail.>Manage your sales pipeline with built-in forecasting tools.What Is Customer Relationship Management (CRM)?CRM stands for customer relationship management and typically refers to software, like Zoho, that helps you manage your customer relationships. From a sales perspective, it means things like inputting and tracking leads, checking up on those leads, converting leads to contacts, and ultimately to deals. From a management perspective, you can track the progress of your sales team, create and run reports, and gather insights into your sale cycles and forecasts. Simply stated, the goal of a capable CRM product, such as Zoho, is to run your business efficiently, effectively and to increase profitability.Contents:What in the World is Zoho?Working with Contact RecordsWorking with Contact RecordsFind And Change RecordsStay in TouchHave it Your Way (set up the system)Managing UsersE-mail BlastsPipelines and DealsManaging ProductsProjectsCasesReports and DashboardsHacks and ShortcutsAbout the Author:A full-time consultant and trainer since the 1980s, Karen Fredricks is the author of thirteen books on CRM and Contact Management Software, including eleven “For Dummies” titles. Her work includes titles on ACT, Outlook, SugarCRM, Outlook Business Contact Manager, and Microsoft Office Live. She created training videos on Outlook and ACT! for LinkedIn Learning. A true CRM fanatic, she is the Virtual CRM Users Group founder and holds frequent webinars focusing on CRM usage.Karen’s company, Tech Benders, provides consulting, support, and training services for a variety of CRM products. Her focus is on making companies more efficient and productive—and therefore more profitable. She has worked with numerous Fortune 500 companies and other well-known entities, including the PGA, the ATP, FPL, and Volvo of North America.

Zombie Wars: An Unofficial Graphic Novel for Minecrafters (Unofficial Battle Station Prime Series #5)

by Cara J. Stevens

Attention, Minecraft fans! Take a wild trip into the game you love with a new graphic novel from Cara J. Stevens. Over 700 color illustrations! The kids of Battle Station Prime continue to fight against the unknown villain who has been sending armies of skeletons, but Brooklyn&’s recent invention of an automatic Zombie spawner could change the face of this unending battle. With the zombies on their side, they just might have a chance to uncover the truth about the enemies of the Prime Knight and save their homes. As daily battles of skeletons against zombies are becoming routine, the kids are beginning to think about their place at the battle station and their true purpose. While some choose to return home to fight with their families on different battlefronts, others redouble their efforts to protect the station. Will Pell and Logan&’s lifelong friendship survive this test? Has Zoe&’s recent run-in with Herobrine&’s ghost changed her forever? Who will win the ultimate cook-off battle between Ned and the kids&’ ultimate automatic food machine? Learn all the answers and more in Book 5: The Zombie Wars!

Zombies Ate My Homework: An Unofficial Graphic Novel for Minecrafters (Redstone Junior High #1)

by Cara J. Stevens Fred Borcherdt

This story kicks off a new full-color series of unofficial graphic novels for Minecrafters! When quiet farm girl Pixel receives an acceptance letter from the prestigious academy for gifted students, Redstone Junior High, she is thrilled! And she works up the courage to leave her family and her beloved farm animals to become a Redstone student. The school prides itself on its safety record as much as its academics -- Mob-free for more than 100 years! boasts a sign on campus.Little does Pixel know that the school's long history of safety is about to take an unsettling turn. When zombies begin popping up on campus, the students begin to panic. Pixel, with the help of her new best friends, is the only one who can figure out why the zombies are invading -- but can she do it before the school becomes a battlefield?The adventure that unfolds will test Pixel's courage, reveal a unique and precious gift that she never knew she had, and change how she treats hostile mobs forever. <P><P> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. Benetech is actively working on projects to improve accessibility issues such as these.</i>

Zombies Attack!: The Rise of the Warlords Book One: An Unofficial Interactive Minecrafter's Adventure (Rise of the Warlords #1)

by Mark Cheverton

The Far Lands is a hidden area located at the very edge of Minecraft’s outer borders, unknown to normal users. There, the life of a young boy named Watcher is suddenly turned upside down when his village is destroyed by the vile zombie warlord Tu-Kar. Watcher and a handful of his friends vow to save those who were captured during the devastating battle and bring the zombie leader to justice. But along the way, they’ll uncover a terrifying secret about the monsters in the Far Lands, one that could change Minecraft forever.The Rise of the Warlords series is an interactive Minecraft adventure like never before, giving fans the option to play along in Minecraft as they read on custom Far Lands worlds exclusively designed by bestselling author Mark Cheverton.

ZooKeeper: Distributed Process Coordination

by Flavio Junqueira Benjamin Reed

Building distributed applications is difficult enough without having to coordinate the actions that make them work. This practical guide shows how Apache ZooKeeper helps you manage distributed systems, so you can focus mainly on application logic. Even with ZooKeeper, implementing coordination tasks is not trivial, but this book provides good practices to give you a head start, and points out caveats that developers and administrators alike need to watch for along the way. In three separate sections, ZooKeeper contributors Flavio Junqueira and Benjamin Reed introduce the principles of distributed systems, provide ZooKeeper programming techniques, and include the information you need to administer this server. Learn how ZooKeeper solves common coordination tasks Explore the ZooKeeper API's Java and C implementations and how they differ Use methods to track and react to ZooKeeper state changes Handle failures of the network, application processes, and ZooKeeper itself Learn about ZooKeeper's trickier aspects dealing with concurrency, ordering, and configuration Use the Curator high-level interface for connection management Become familiar with ZooKeeper internals and administration tools

Zoom For Dummies

by Phil Simon

Unlock the full potential of Zoom with this straightforward resource Zoom For Dummies shows readers how to stay connected to their friends, family, colleagues, and peers with this explosively popular communication platform. Written by business professional Phil Simon, Zoom For Dummies allows you to take full advantage of Zoom’s multi-faceted feature set, including: The "Meetings" feature Webinar capabilities Instant messaging functionality Zoom’s “Channel” features Zoom For Dummies goes beyond video conferencing and unlocks the full power of this service. You’ll be able to connect with people around the globe, record and replay video, share your screen with others, and use Zoom on your desktop, laptop, tablet, and mobile device. The book shows you how to follow best practices when it comes to Zoom’s enhanced security features, as well as how to keep Zoom up to date. Written in the friendly style the For Dummies series is famous for, Zoom For Dummies is perfect for anyone who uses Zoom for school, work, business, or personal reasons.

Zoom für Dummies (Für Dummies)

by Phil Simon

Sie wollen oder müssen Zoom zur Kommunikation nutzen? Egal ob privat oder geschäftlich, es gibt viele Funktionen, Einstellungen und Tipps, die Ihnen das Leben leichter machen. Phil Simon erklärt Ihnen in diesem Buch alles, was Sie über Chat, Videokonferenzen und das Einbinden von Apps wissen müssen. Egal ob das Erstellen von Einladungen, das Aufzeichnen von Konferenzen oder die Nutzung von Zoom Phones, alles wird ausführlich und leicht verständlich anhand von Screenshots erklärt. So nutzen Sie Zoom entspannt und effizient.

Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

by Ravi Devarasetty

Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end usersKey FeaturesGet up to speed with Zscaler without the need for expensive trainingImplement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deploymentsFind out how to choose the right options and features to architect a customized solution with ZscalerBook DescriptionMany organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications. You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise. By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. What you will learnUnderstand the need for Zscaler in the modern enterpriseStudy the fundamental architecture of the Zscaler cloudGet to grips with the essential features of ZIA and ZPAFind out how to architect a Zscaler solutionDiscover best practices for deploying and implementing Zscaler solutionsFamiliarize yourself with the tasks involved in the operational maintenance of the Zscaler solutionWho this book is forThis book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.

Refine Search

Showing 56,151 through 56,175 of 56,179 results