SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Zero Trust in Resilient Cloud and Network Architectures

Zero Trust in Resilient Cloud and Network Architectures

Zero Trust in Resilient Cloud and Network Architectures

Josh Halley, Dhrumil Prajapati, Ariel Leza og Vinay Saini
(2025)
Sprog: Engelsk
Pearson Education, Limited
515,00 kr.
Denne bog er endnu ikke udgivet. Den forventes Oct 2025.

Detaljer om varen

  • Paperback: 864 sider
  • Udgiver: Pearson Education, Limited (Oktober 2025)
  • Forfattere: Josh Halley, Dhrumil Prajapati, Ariel Leza og Vinay Saini
  • ISBN: 9780138204600

Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineers, offers a real-world, hands-on guide to deploying automated architectures with a focus on segmentation at any scale--from proof-of-concept to large, mission-critical infrastructures. Whether you're new to software-defined and cloud-based architectures or looking to enhance an existing deployment, this book will help you:

  • Implement Zero Trust: Segment and secure access while mitigating IoT risks
  • Automate Network Operations: Simplify provisioning, authentication, and traffic management
  • Deploy at scale following best practices for resilient and secure enterprise-wide network rollouts
  • Integrate with Cloud Security, bridging on-prem and cloud environments seamlessly
  • Learn from Real-World Case Studies: Gain insights from the largest Cisco enterprise deployments globally

 

This edition covers Meraki, EVPN, Pub/Sub, and Terraform and Ansible-based deployments with a key focus on network resilience and survivability. It also explores quantum security and Industrial Zero Trust, along with Cisco's latest evolutions in software-defined networking, providing exclusive insights into its enhancements, architecture improvements, and operational best practices. If you're a network, security, or automation specialist, this book is your essential guide to building the next-generation, zero-trust network.

Introduction xxxix
Chapter 1 Zero Trust Demystified 1 Definition of Zero Trust 1 How It All Began 2 Why We Need Zero Trust 3 Core Principles of Zero Trust 5 Major Zero Trust Industry Standards 11 People, Processes, and Technology 15 On-Premises vs. Cloud 19 Hybrid Environment Recommendations 23 Security Certifications 24 Summary 26 References 27
Chapter 2 Secure Automation and Orchestration Overview 29 Introduction to Automation and Orchestration 29 Building Blocks of Secure Automation 35 Common Automation Practices and Tools 40 AI and Machine Learning with Automation 47 Summary 52
Chapter 3 Zero Trust Network Deployment 53 Elements of Zero Trust Strategy Definitions 54 Tools and Technologies 63 Identifying Business Workflows 66 Applying Zero Trust Using SSE 67 ZTNA Deployment Scenarios 71 Summary 74
Chapter 4 Security and Segmentation 75 Overview 75 Segmentation Options 76 Methods of TrustSec Transport 91 Control Plane TrustSec Transport 96 Summary 101
Chapter 5 DHCP and Dynamic Addressing Concepts 103 Introduction to Dynamic Addressing 103 Zero Trust Approach to Dynamic Addressing 109 DHCP Options 113 DHCP Authentication 114 IPv6 Address Assignment 115 IPv6 First Hop Security 123 Summary 126
Chapter 6 Automating the Campus 127 Overview 127 Planning 128 Execution 135 Summary 147 References 147
Chapter 7 Plug-and-Play and Zero-Touch Provisioning 149 Overview 149 Plug-and-Play Provisioning 150 Zero-Touch Provisioning 165 Template Usage in Catalyst Center 169 Programmability-Based Deployment 172 Customer Use Cases 177 Summary 183
Chapter 8 Routing and Traffic Engineering 185 Overview 185 Routing 187 Traffic Engineering 212 Summary 218 References 218
Chapter 9 Authentication and Authorization 219 Overview 219 A Broader View of Identity 220 Authentication and Authentication Methods 223 Authorization 243 Customer Use Cases 249 Summary 252
Chapter 10 Quantum Security 253 What Is Quantum Computing? 253 Quantum Computing and Emerging Security Threats 265 Approaches to Safeguard Against Quantum Adversaries 270 Summary 278
Chapter 11 Network Convergence and Considerations 279 What Is Convergence? 279 Convergence in Layer 3 Routed Architectures 281 Methodologies of Convergence Testing 300 Monitoring Security Convergence 308 Summary 314
Chapter 12 Software-Defined Network Deployment Best Practices 315 Introduction 315 Network Deployment Lifecycle 317 Stage
1: Planning and Design 318 Stage
2: Deployment and Migration 324 Stage
3: Operations and Management 330 Summary 335 References 336
Chapter 13 Wired and Wireless Assurance 337 What Is the Best Practice for Your Enterprise Architecture? 337 Wired Network Best Practice Design Concepts 338 Tiered Network Design 340 Stacking Constructs 342 Layer 3 Architectures 343 Optimizing Wireless Networks 344 Anchoring Concepts (Catalyst/Meraki) 351 Monitoring TrustSec and Security Enforcement 354 Case Study: Financial Sector Customer 358 Summary 360
Chapter 14 Large-Scale Software-Defined Network Deployment 361 Introduction 361 Network Design 362 Security 367 Automation 369 Implementation: Kyle and Jason Go to Fast Burger 377 Summary 379
Chapter 15 Cloud-Native Security Foundation 381 Introduction to Cloud-Native Security: A Zero Trust Perspective 381 Cloud Infrastructure Security: Pillars and Practices in the Modern Cloud 393 Key Management in Cloud Environments 400 Network Security Evolution and Segmentation 404 Navigating Multicloud and Hybrid Cloud Security 413 Monitoring and Logging Requirements for Compliance 421 Summary 435 References 436
Chapter 16 Cloud-Native Application Security 437 Introduction to Cloud-Native Application Security 437 Role of Cloud-Native Application Protection Platform (CNAPP) 458 Building Secure Applications with Cloud-Native Security 460 Unique Security Considerations for Serverless Architectures 470 Emerging Trends and Future Outlook in Cloud-Native Security 482 Summary 485 References 486
Chapter 17 Data Center Segmentation On-Prem to the Cloud 487 Introduction to Data Center Segmentation in Hybrid and Multicloud Environments 487 Zero Trust and Microsegmentation Principles for Segmentation 489 Segmentation Challenges in Hybrid and Multicloud Environments 491 Ways to Implement End-to-End Segmentation Policies with Zero Trust 493 Ways to Migrate Segmentation Policies: From On-Premises to Cloud 496 Web3 and Immutable Trust in Hybrid Cloud Segmentation 514 Summary 534 References 534
Chapter 18 Using Common Policy to Enforce Security 535 Introduction to Security Policies 535 Designing Common Security Policies 536 Policy Enforcement Mechanisms 539 Identity and Access Management (IAM) Policies 541 Data Protection and Privacy Policies 543 Network Security Policies 543 From SDLC to SDL to SSDLC: A Journey Toward Secure Software Development 544 OWASP SAMM: A Framework for Security Maturity 557 Monitoring, Logging, and Auditing Policies 563 Incident Response and Remediation Policies 564 Policy Compliance and Verification 564 Challenges in Policy Enforcement Across Hybrid Environments 565 Future Directions in Policy-Based Security 565 Summary 568 References 569
Chapter 19 Workload Mobility: On-Prem to Cloud 571 Definition and Scope of Workload Mobility 571 Is Your Cloud Ready for Your Workloads? Understanding the Benefits and Challenges 572 Choosing a Cloud Model with Zero Trust as the Goal 579 Analysis of TCO and ROI for Workload Migration 581 Building Out a Secure Migration Plan 583 Integrating AWS''s Well-Architected Framework: Case Study of ABC Corp 587 Workload Migration Frameworks and Tools 589 Data Security During Workload Migration 593 Data Transfer vs. Cloud Migration: An Overview 598 Cloud Migration Security 604 Quality Engineering: The Heart of Cloud Migration 614 Network and Connectivity Considerations 616 Managing IP Addressing and DNS Changes 637 Ensuring High Availability and Disaster Recovery Readiness 643 Security Posture Adjustment Post-Migration 645 Identity and Access Management in Hybrid Environments 649 Summary 664 References 665
Chapter 20 Resilience and Survivability
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Fysisk eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.