Browse Results

Showing 57,901 through 57,925 of 57,951 results

Zen of Cloud: Learning Cloud Computing by Examples, Second Edition

by Haishi Bai

This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions. This book provides both "hows" and "whys." It peers behind the buzz words such as machine learning, containers, and blockchains to help readers understand how to put those technologies into practical use. This unique book covers a broad spectrum of technologies of cloud computing.

Zen of Postproduction: Stress-Free Photography Workflow and Editing

by Mark Fitzgerald

Breathe deep and relax - this book takes the stress out of photography post-production While capturing the perfect photograph is a welcome creative challenge for photographers, post-production can often be a headache. Downloading, sorting, tagging, editing, and distributing your digital images - especially the enormous quantities produced in today's image-happy world - can be overwhelming. Time to take a deep breath and sit down with a copy of this calming book. Digital worksflow teacher and author Mark Fitzgerald offers low-stress, post-production photography workflows and editing solutions that will make your life easier. Walking you through the latest photography software, especially Adobe Lightroom and Adobe Photoshop, Mark offers sensible advice and answers all your post-production questions, whether you're a professional photographer, serious amateur, or motivated novice. Takes the stress out of photography post-production by offering effective, timesaving, no-hassle solutions for overworked digital photographers Helps you streamline and simplify such post-production tasks as downloading, sorting, tagging, editing, and distributing digital images Explores the latest photography software, with special emphasis on Adobe Lightroom and Adobe Photoshop Offers straightforward advice for professional photographers and serious amateurs Includes practical, real-world examples, so you can immediately apply what you're learning Get into a better, more relaxing place with your photography post-production workflows and tasks with Zen of Post Production: Stress-Free Photography Workflow and Editing.

The Zen of Social Media Marketing: An Easier Way to Build Credibility, Generate Buzz, and Increase Revenue

by Chris Brogan Shama Hyder

Freshly Updated Edition of the Ultimate Primer and How-To Guide for Social Media MarketingFive years ago, the first edition of The Zen of Social Media Marketing became a global bestseller. Three years after that, the updated edition helped even more marketers and executives navigate the sometimes-stressful world of social media. Now, this new, up-to-date edition offers timely insight to the ways social media has changed and how best to market in it.Whether you use social media now or not, people are already talking about your company online. By becoming part of the conversation in a more meaningful way, you can start connecting directly to your customers and clients and finding new ones right away with ease and efficiency.Social media marketing isn't like traditional marketing-and treating it that way only leads to frustration and failure. In The Zen of Social Media Marketing, Shama Hyder, social media expert and president of The Marketing Zen Group (MarketingZen.com), teaches you the "Zen" of using social media tools to find your own marketing nirvana.With a foreword by New York Times bestselling author Chris Brogan and new and updated content on content marketing, email marketing, the importance of mobile, social advertising, and more, the newest edition of The Zen of Social Media Marketing gives you:A comprehensive overview of why social media works and how to use it to drive traffic to your website and fan pageA proven process to attract followers and fans and convert them into customers and clientsThe latest social media trends and step-by-step guidelines for sites and apps such as Instagram, Pinterest, Snapchat, Imgur, LINE, and more All new information on why, when, and how to use online advertisingInnovative tips for mobile designEssential advice on content marketing and targeted tactics to enhance your SEOWhy self-expression is the true driver of social media use and how to leverage it for your businessInsights from dozens of leading online marketers and entrepreneurs, with strategies for success

The Zen of Social Media Marketing

by Shama Kabani

The Ultimate Primer and How-To Guide for Social Media MarketingIn the two years since the first edition became a global bestseller, the world of social media has grown and changed enough to require an updated guide.Whether you use social media now or not, people are already talking about your company online. By becoming part of the conversation in a more meaningful way, you can start connecting directly to your customers and clients and finding new ones right away with ease and efficiency.Social media marketing isn't like traditional marketing--and treating it that way only leads to frustration and failure. In The Zen of Social Media Marketing, Shama Kabani, social media expert and president of The Marketing Zen Group (MarketingZen.com), teaches you the "Zen" of using social media tools to find your own marketing nirvana.With a foreword by New York Times bestselling author Chris Brogan and updated content on Google+, online advertising, SEO, and more, the newest edition of The Zen of Social Media Marketing gives you:* A comprehensive overview of why social media works and how to use it to drive traffic to your website and fan page* A proven process to attract followers and fans and convert them into customers and clients* The latest updates and step-by-step guidelines for Facebook, Twitter, LinkedIn, Google+, and group-buying sites such as Groupon and LivingSocial* Tips on why, when, and how to use online advertising* Essential advice on content marketing and targeted tactics to enhance your SEO* New information on why self-expression is the true driver of social media use and how to leverage it for your business* Insights from dozens of leading online marketers and entrepreneurs, with strategies for success

Zend Framework 1.8 Web Application Development

by Keith Pope

This book is an example-driven tutorial that takes you through the process of building Model-View-Controller-based web applications. You will create and develop a storefront application. It also covers common mistakes and best practices that will be helpful for developers. This book is for PHP web developers who want to get started with Zend Framework. If you are already using this framework, you will learn how to use it in the best way and produce better applications. Basic knowledge of Object Oriented design will be helpful.

Zend Framework 2.0 by Example: Beginner’s Guide

by Krishna Shasankar V

Zend Framework 2.0 by Example: Beginner's Guide is a step-by-step guide that aims to empower you to build web applications packed with some really exciting features using Zend Framework 2.0.If you are a PHP Developer who is new to Zend Framework, but you want to get hands-on with the product quickly, this book is for you. Basic knowledge of object oriented programming with PHP is expected.

Zend Framework 2 Application Development

by Christopher Valles

The book is really pragmatic, focusing on the key aspects you usually need to create an application. We skip the boring theory and jump straight to the action. Also, the examples don't try to be perfect, they just show the topic in question or the tool/components we are using. Here the focus is on the framework itself not on how to architect applications. The book will spend a lot of time reviewing the examples and each chapter is created around the example used to explain the topics so the example is first, then the explanation.This book is great for you if you are new to Zend Framework 2 and are looking to get a practical approach in how to use the framework. This book will be also really helpful if you are a Zend Framework 1 user but you want to adapt you knowledge to the new version of the framework. It's assumed that you will have good experience using PHP and specially with the Object Oriented programming paradigm.

Zend Framework 2 Cookbook

by Josephus Callaars

This book is written in a practical, cookbook style with numerous examples and recipes. This style allows you to go both directly to your topic of interest or follow topics throughout a chapter to gain an in-depth knowledge of certain areas.'Zend Framework 2 Cookbook" is for PHP developers who are fairly advanced in programming in PHP. It will also be useful for developers who have a keen interest in expanding their knowledge outside the boundaries of simply scripting pages together. As unit testing and MVC will be discussed, it is beneficial for the reader to know what these technologies are, although experience with developing applications is not necessarily essential.

Zend Framework in Action

by Steven K. Brown Nick Lo Rob Allen

From rather humble beginnings as the Personal Home Page scripting language, PHP has found its way into almost every server, corporation, and dev shop in the world. On an average day, somewhere between 500,000 and 2 million coders do something in PHP. Even when you use a well-understood language like PHP, building a modern web application requires tools that decrease development time and cost while improving code quality. Frameworks such as Ruby-on-Rails and Django have been getting a lot of attention as a result.For PHP coders, the Zend Framework offers that same promise without the need to move away from PHP. This powerful collection of components can be used in part or as a whole to speed up the development process. Zend Framework has the backing of Zend Technologies; the driving force behind the PHP programming language in which it is written. The first production release of the Zend Framework became available in July of 2007.Zend Framework in Action is a comprehensive tutorial that shows how to use the Zend Framework to create web-based applications and web services. This book takes you on an over-the-shoulder tour of the components of the Zend Framework as you build a high quality, real-world web application. This book is organized around the techniques you'll use every day as a web developer "data handling, forms, authentication, and so forth. As you follow the running example, you'll learn to build interactive Ajax-driven features into your application without sacrificing nuts-and-bolts considerations like security and performance.This book is aimed at the competent PHP developer who wants to master framework-driven web development. Zend Framework in Action goes beyond the docs but still provides quick access to the most common topics encountered in the development of web applications. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Zenobia July

by Lisa Bunker

The critically acclaimed author of Felix Yz crafts a bold, heartfelt story about a trans girl solving a cyber mystery and coming into her own. <P><P>Zenobia July is starting a new life. She used to live in Arizona with her father; now she's in Maine with her aunts. She used to spend most of her time behind a computer screen, improving her impressive coding and hacking skills; now she's coming out of her shell and discovering a community of friends at Monarch Middle School. People used to tell her she was a boy; now she's able to live openly as the girl she always knew she was. <P><P>When someone anonymously posts hateful memes on her school's website, Zenobia knows she's the one with the abilities to solve the mystery, all while wrestling with the challenges of a new school, a new family, and coming to grips with presenting her true gender for the first time. Timely and touching, Zenobia July is, at its heart, a story about finding home.

Zenoss Core 3.x Network and System Monitoring

by Michael Badger

The book starts by covering installation and configuration, before moving on to administration and dashboard usage. It contains step-by-step instructions for setting up and using a working, capable Zenoss system. This book is written primarily for network and systems administrators who are monitoring their IT assets with Zenoss Core or who plan to monitor them. In reality, this book will benefit anyone, regardless of job title, who recognizes the importance of proactively monitoring the servers, routers, computers, websites, and devices that connect companies to customers.

Zenoss Core Network and System Monitoring

by Michael Badger

The book starts by covering installation and configuration, before moving onto administration and dashboard usage.The book contains step-by-step instructions for setting up and using a working, capable Zenoss system. From small business to a large enterprise, this books helps organizations collect data, monitor, and report on their IT assets. Zenoss Core offers a feature-rich, accessible solution to organizations that lack the financial resources to purchase a proprietary monitoring solution or the technical resources. This book makes no distinction about your existing systems management knowledge or lack; thereof and assumes everyone is new to Zenoss Core. The emphasis is on configuring and administering a monitoring environment from the comforts of a graphical web interface.

The Zephyr Conspiracy (Level Up)

by Israel Keats

In a virtual reality treasure hunt game, a gamer named Gadget is a steampunk pirate looking for her captain's lost treasure—a mysterious mechanical device. If she can find the scattered pieces that make up the device, she'll be released from the game. But the further she gets into it, the more Gadget worries she's in over her head. In a game where it's hard to know who's a real person and who's a non-player character, can Gadget trust anyone?

Zephyr RTOS Embedded C Programming: Using Embedded RTOS POSIX API

by Andrew Eliasz

These days the term Real-Time Operating System (RTOS) is used when referring to an operating system designed for use in embedded microprocessors or controllers. The “Real Time” part refers to the ability to implement applications that can rapidly responding to external events in a deterministic and predictable manner. RTOS-based applications have to meet strict deadline constraints while meeting the requirements of the application. One way of ensuring that urgent operations are handled reliably is to set task priorities on each task and to assign higher priorities to those tasks that need to respond in a more timely manner.Another feature of real-time applications is the careful design and implementation of the communication and synchronization between the various tasks. The Zephyr RTOS was developed by Wind River Systems, and subsequently open sourced. Its design and implementation are oriented towards the development of time critical IoT (Internet of Things) and IIoT (Industrial Internet of Things) applications, and, consequently it has a rich feature set for building both wireless and wired networking applications. However, with a rich feature set comes a fairly steep learning curve.This book covers the foundations of programming embedded systems applications using Zephyr's Kernel services. After introducing the Zephyr architecture as well as the Zephyr build and configuration processes, the book will focus on multi-tasking and inter-process communication using the Zephyr Kernel Services API. By analogy with embedded Linux programming books, this book will be akin a Linux course that focuses on application development using the Posix API. In this case, however, it will be the Zephyr Kernel Services API that will be the API being used as well as the Posix API features supported by Zephyr.What You’ll learnAn Overview of the Cortex-M Architecture.Advanced data structures and algorithms programming (linked lists, circular buffers and lists).How to build Zephyr Applications, including setting up a Command Line Zephyr Development Environment on Linux.Task scheduling and pre-emption patterns used in Real Time Operating Systems.Scheduling, Interrupts and Synchronization, including threads, scheduling, and system threads.Overview of Symmetric Multiprocessing (SMP) and Zephyr support for SMP. Memory management, including memory heaps, memory slabs, and memory pools.Who This Book Is ForEmbedded Systems programmers, IoT and IIoT developers, researchers, BLE application developers (Industrial Control Systems, Smart Sensors, Medical Devices, Smart Watches, Manufacturing, Robotics). Also of use to undergraduate and masters in computer science and digital electronics courses.

Zero Comments: Blogging and Critical Internet Culture (Kultur- Und Medientheorie Ser.)

by Geert Lovink

In Zero Comments, internationally renowned media theorist and 'net critic' Geert Lovink revitalizes worn out concepts about the Internet and interrogates the latest hype surrounding blogs and social network sites. In this third volume of his studies into critical Internet culture, following the influential Dark Fiber and My First Recession, Lovink develops a 'general theory of blogging.' He unpacks the ways that blogs exhibit a 'nihilist impulse' to empty out established meaning structures. Blogs, Lovink argues, are bringing about the decay of traditional broadcast media, and they are driven by an in-crowd dynamic in which social ranking is a primary concern. The lowest rung of the new Internet hierarchy are those blogs and sites that receive no user feedback or 'zero comments'. Zero Comments also explores other important changes to Internet culture, as well, including the silent globalization of the Net in which the West is no longer the main influence behind new media culture, as countries like India, China and Brazil expand their influence and looks forward to speculate on the Net impact of organized networks, free cooperation and distributed aesthetics.

Zero Configuration Networking: The Definitive Guide

by Daniel H Steinberg Stuart Cheshire

It used to be that two laptops, sitting side by side, couldn't communicate with each other; they may as well have been a thousand miles apart. But that was then, before the advent of Zero Configuration Networking technology. This amazing cross-platform open source technology automatically connects electronic devices on a network, allowing them to interoperate seamlessly-without any user configuration. So now you don't have to lift a finger! Needless to say, it has completely changed the way people connect to devices and programs for printing, file sharing, and other activities. Zero Configuration Networking: The Definitive Guide walks you through this groundbreaking network technology, with a complete description of the protocols and ways to implement network-aware applications and devices. Written by two Zero Configuration Networking experts, including one of Apple's own computer scientists, the book covers more than just file sharing and printing. Zero Configuration Networking also enables activities such as music and photo sharing and automatic buddy discovery on Instant Messaging applications. In fact, Zero Configuration Networking can be used for virtually any device that can be controlled by a computer. And this handy guide has the inside scoop on all of its capabilities-and how you can easily apply them in your own environment. For the technically advanced, Zero Configuration Networking: The Definitive Guide examines the three core technologies that make up Zero Configuration Networking: Link-Local Addressing, Multicast DNS, and DNS Service Discovery. It also reviews a series of APIs, including C-API, Java API, CFNetServices, and Cocoa's NSNetServices. Whether you want to understand how iTunes works, or you want to network a series of laptops and other devices at your office for maximum efficiency, you'll find all the answers in this authoritative guide.

Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

by Andy Bogart Lillian Ablon

Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.

Zero to AI: A non-technical, hype-free guide to prospering in the AI era

by Gianluco Mauro Nicolo Valigi

Summary How can artificial intelligence transform your business? In Zero to AI, you&’ll explore a variety of practical AI applications you can use to improve customer experiences, optimize marketing, help you cut costs, and more. In this engaging guide written for business leaders and technology pros alike, authors and AI experts Nicolò Valigi and Gianluca Mauro use fascinating projects, hands-on activities, and real-world explanations to make it clear how your business can benefit from AI. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology There&’s no doubt that artificial intelligence has made some impressive headlines recently, from besting chess and Go grand masters to producing uncanny deep fakes that blur the lines of reality. But what can AI do for you? If you want to understand how AI will impact your business before you invest your time and money, this book is for you. About the book Zero to AI uses clear examples and jargon-free explanations to show the practical benefits of AI. Each chapter explores a real-world case study demonstrating how companies like Google and Netflix use AI to shape their industries. You begin at the beginning, with a primer on core AI concepts and realistic business outcomes. To help you prepare for the transition, the book breaks down a successful AI implementation, including advice on hiring the right team and making decisions about resources, risks, and costs. What's inside Identifying where AI can help your organization Designing an AI strategy Evaluating project scope and business impact Using AI to boost conversion rates, curate content, and analyze feedback Understanding how modern AI works and what it can/can&’t do About the reader For anyone who wants to gain an understanding of practical artificial intelligence and learn how to design and develop projects with high business impact. About the author Gianluca Mauro and Nicolò Valigi are the cofounders of AI Academy, a company specializing in AI trainings and consulting. Table of Contents: 1. An introduction to artificial intelligence PART 1 - UNDERSTANDING AI 2. Artificial intelligence for core business data 3. AI for sales and marketing 4. AI for media 5. AI for natural language 6. AI for content curation and community building PART 2 - BUILDING AI 7. Ready—finding AI opportunities 8. Set—preparing data, technology, and people 9. Go—AI implementation strategy 10. What lies ahead

Zero to Hero: Your Guide to a Career in Cybersecurity

by Felix Kyei Asare

Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book stands as a beacon of clarity and practical wisdom. Tailored for novices and those with basic understanding, this resource empowers learners to solidify their cybersecurity foundation. It stands out with its laser focus on real-world applicability, ensuring readers grasp theoretical concepts and can implement them effectively.Key Features of This Guide: Actionable Learning: Dive into engaging exercises, compelling case studies, and practical scenarios that demystify complex cybersecurity concepts Career Development: Gain invaluable insights into crafting a standout resume, navigating job interviews with confidence, and learning strategies for a successful job hunt in the cybersecurity realm Cutting-Edge Knowledge: Stay ahead of the curve with detailed explorations of the latest cybersecurity trends, tools, and technologies that are shaping the future of digital security In-Depth Discussions: From ethical hacking to digital forensics, explore the breadth and depth of the cybersecurity field, ensuring a comprehensive understanding of various career paths Progressive Skill-Building: Embark on a structured learning journey, from foundational concepts to advanced techniques, tailored to foster a deep, actionable understanding of cybersecurity Zero to Hero: Your Guide to a Career in Cybersecurity is your launchpad into the heart of the industry. Perfect for students, career changers, and IT professionals, this book provides the essential knowledge and skills to secure a rewarding career in this critical field. Begin your journey from novice to expert in cybersecurity today!

Zero-trust – An Introduction (River Publishers Rapids Series in Digital Security and Forensics)

by Tom Madsen

The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies: Cloud Networking Identity management Operational Technology (OT) 5G Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.

Zero Trust and Third-Party Risk: Reduce the Blast Radius

by Gregory C. Rasner

Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you’ll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization—KC Enterprises—to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You’ll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trustAn essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.

The Zero Trust Framework: Threat Hunting & Quantum Mechanics

by Ravindra Das

The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.

The Zero Trust Framework and Privileged Access Management (PAM)

by Ravindra Das

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.

Zero Trust Journey Across the Digital Estate

by Abbas Kudrati Binil A. Pillai

"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that show us that our past approaches, while earnest in their efforts have not stopped attackers. Zero Trust strategically focuses on and systematically removes the power and initiatives hackers and adversaries need to win as they circumvent security controls. This book will help you and your organization have a better understanding of what Zero Trust really is, it's history, and to gain prescriptive knowledge that will help you and your business finally begin beating the adversaries in the chess match that is cyber security strategy." Dr. Chase Cunningham (aka Dr. Zero Trust), Cyberware Expert Today’s organizations require a new security approach that effectively adapts to the challenges of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they are located. Zero Trust is increasingly becoming the critical security approach of choice for many enterprises and governments; however, security leaders often struggle with the significant shifts in strategy and architecture required to holistically implement Zero Trust. This book seeks to provide an end-to-end view of the Zero Trust approach across organizations’ digital estates that includes strategy, business imperatives, architecture, solutions, human elements, and implementation approaches that could enhance these organizations' success in learning, adapting, and implementing Zero Trust. The book concludes with a discussion of the future of Zero Trust in areas such as artificial intelligence, blockchain technology, operational technology (OT), and governance, risk, and compliance. The book is ideal for business decision makers, cybersecurity leaders, security technical professionals, and organizational change agents who want to modernize their digital estate with the Zero Trust approach.

Zero Trust Networks: Building Secure Systems in Untrusted Networks

by Doug Barth Evan Gilman

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it.The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.Understand how perimeter-based defenses have evolved to become the broken model we use todayExplore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty)Get example configuration for open source tools that you can use to build a zero trust networkLearn how to migrate from a perimeter-based network to a zero trust network in production

Refine Search

Showing 57,901 through 57,925 of 57,951 results