Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy
Securing the Future (eBook, PDF)
Introduction to Zero Trust in Cybersecurity
53,49 €
inkl. MwSt.
Sofort per Download lieferbar
Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy
Securing the Future (eBook, PDF)
Introduction to Zero Trust in Cybersecurity
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to practical insights on implementing Zero Trust networks and extending its principles to cloud environments. It addresses the crucial aspects of compliance and governance within the Zero Trust framework and provides real-world applications and case studies showcasing successful Zero Trust…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 2.24MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 (eBook, PDF)149,79 €
- Fevrier ValdezHybrid Competitive Learning Method Using the Fireworks Algorithm and Artificial Neural Networks (eBook, PDF)48,14 €
- Samiksha ShuklaData Ethics and Challenges (eBook, PDF)58,84 €
- KC SantoshActive Learning to Minimize the Possible Risk of Future Epidemics (eBook, PDF)48,14 €
- Cyber Security Intelligence and Analytics (eBook, PDF)223,63 €
- Cyber Security Intelligence and Analytics (eBook, PDF)223,63 €
- Marek AmanowiczData-Centric Security in Software Defined Networks (SDN) (eBook, PDF)139,09 €
-
-
-
This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to practical insights on implementing Zero Trust networks and extending its principles to cloud environments. It addresses the crucial aspects of compliance and governance within the Zero Trust framework and provides real-world applications and case studies showcasing successful Zero Trust implementations. Furthermore, it underscores the importance of cultivating Zero Trust awareness throughout organizational culture to fortify security measures effectively. Highlighting both the challenges and the future potential of Zero Trust, this book offers a roadmap for organizations seeking to bolster their cybersecurity defenses amidst an evolving threat landscape.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Switzerland
- Seitenzahl: 96
- Erscheinungstermin: 2. Juli 2024
- Englisch
- ISBN-13: 9783031637810
- Artikelnr.: 71212597
- Verlag: Springer Nature Switzerland
- Seitenzahl: 96
- Erscheinungstermin: 2. Juli 2024
- Englisch
- ISBN-13: 9783031637810
- Artikelnr.: 71212597
Gururaj H L (Senior Member, IEEE & ACM) received the Ph.D. degree in computer science and engineering from Visvesvaraya Technological University India in 2019. He has published more than 200 research articles in peer-reviewed and reputed international journals. He has authored 15 Edited books in Springer, IET, IGI Global and Taylor & Francis. He has presented more than 100 papers at various international conferences. He is a Senior Member of ACM. He received a Young Scientist International Travel Support ITS-SERB, Department of Science and Technology, Government of India, in December 2016. He was a recipient of best paper awards at various national and international conferences. He was appointed as an ACM Distinguished Speaker (2018–2021) by the ACM U.S. Council. He has been honored as Keynote Speaker, Session chair, TPC member, Advisory committee member at International Seminars, Workshops and Conferences across Globe. Gururaj's research interests are Applications in Machine and Federated Learning, data mining, Blockchain and cyber security.
Spoorthi M received the B.E. and M.Tech. degrees in computer science and engineering from Visvesvaraya Technological University. She has published various research papers in National and International Journals. She has received BEST PAPER AWARDS at various conferences. She is a member of ACM and IEEE. Spoorthi M currently working as Assistnat Professor at Department of Information Science and Engineering, Vidhyavardhaka College of Engineering, Mysuru, India. Her research interests include Cyber Security, Machine Learning and Deep learning.
Vinayakumar Ravi is an Assistant Research Professor at Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia. His previous position was a Postdoctoral research fellow in developing and implementing novel computational and machine learning algorithms and applications for big data integration and data mining with Cincinnati Children's Hospital Medical Center, Cincinnati, OH, USA. His current research interests include applications of data mining, Artificial Intelligence, machine learning (including deep learning) for biomedical informatics, Cyber Security, image processing, and natural language processing. He has more than 100 research publications in reputed IEEE conferences, IEEE Transactions and Journals. His publications include prestigious conferences in the area of Cyber Security, like IEEE S&P and IEEE Infocom. Dr. Ravi has received a full scholarship to attend Machine Learning Summer School (MLSS) 2019, London. He has organized a shared task on detecting malicious domain names (DMD 2018) as part of SSCC'18 and ICACCI'18. He received the Chancellor's Research Excellence Award in AIRA 2021 and his name was included in the World's Top 2% Scientists by Stanford University published in PLoS Biology.
Shreyas J received a B.E degree in M.Tech degree from Visvesvaraya Technological University. He has received a full-time Ph.D. degree from Bangalore University in 2021. All three degrees are in Computer Science and Engineering discipline. He has completed a Ph.D. in the area of Artificial Intelligence of Things in the Department of Computer Science and Engineering, University Visvesvaraya College of Engineering (UVCE, IIT Model College), Bangalore University, Bangalore. He is a recipient of a National Doctoral Fellowship. He is currently working as Assistant Professor, Dept. of Information Technology, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India. He is involved in research, and teaching B.E and M.Tech students of Computer Science and Engineering and he has more than 8.5 years of Research, Academia and Industrial experience. He has published more than 65 papers in International Journals including IEEE, Elsevier, Springer, Frontiers, Inderscience and International Conferences which are indexed by SCI and Scopus. He has received three best paper awards in Hong Kong, Dubai, and NIT Delhi each during International Conferences. He’s authored a book with Springer and serving as the editor for edited volumes with respected publishers such as Elsevier, Springer, and Taylor & Francis.
Kumar Sekhar Roy is an Assistant Professor at Manipal Institute of Technology Bengaluru (MAHE) specializes in Cryptography, Network Security, and IoT Security. With a Ph.D. from NEHU, his research focuses on Post Quantum Cryptography, Secure communication, Authentication protocols, and Hardware Security. He holds expertise in Vivado, AVISPA, C, C++, and Algorithm design. Published extensively and certified in Cyber Security.
Spoorthi M received the B.E. and M.Tech. degrees in computer science and engineering from Visvesvaraya Technological University. She has published various research papers in National and International Journals. She has received BEST PAPER AWARDS at various conferences. She is a member of ACM and IEEE. Spoorthi M currently working as Assistnat Professor at Department of Information Science and Engineering, Vidhyavardhaka College of Engineering, Mysuru, India. Her research interests include Cyber Security, Machine Learning and Deep learning.
Vinayakumar Ravi is an Assistant Research Professor at Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia. His previous position was a Postdoctoral research fellow in developing and implementing novel computational and machine learning algorithms and applications for big data integration and data mining with Cincinnati Children's Hospital Medical Center, Cincinnati, OH, USA. His current research interests include applications of data mining, Artificial Intelligence, machine learning (including deep learning) for biomedical informatics, Cyber Security, image processing, and natural language processing. He has more than 100 research publications in reputed IEEE conferences, IEEE Transactions and Journals. His publications include prestigious conferences in the area of Cyber Security, like IEEE S&P and IEEE Infocom. Dr. Ravi has received a full scholarship to attend Machine Learning Summer School (MLSS) 2019, London. He has organized a shared task on detecting malicious domain names (DMD 2018) as part of SSCC'18 and ICACCI'18. He received the Chancellor's Research Excellence Award in AIRA 2021 and his name was included in the World's Top 2% Scientists by Stanford University published in PLoS Biology.
Shreyas J received a B.E degree in M.Tech degree from Visvesvaraya Technological University. He has received a full-time Ph.D. degree from Bangalore University in 2021. All three degrees are in Computer Science and Engineering discipline. He has completed a Ph.D. in the area of Artificial Intelligence of Things in the Department of Computer Science and Engineering, University Visvesvaraya College of Engineering (UVCE, IIT Model College), Bangalore University, Bangalore. He is a recipient of a National Doctoral Fellowship. He is currently working as Assistant Professor, Dept. of Information Technology, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India. He is involved in research, and teaching B.E and M.Tech students of Computer Science and Engineering and he has more than 8.5 years of Research, Academia and Industrial experience. He has published more than 65 papers in International Journals including IEEE, Elsevier, Springer, Frontiers, Inderscience and International Conferences which are indexed by SCI and Scopus. He has received three best paper awards in Hong Kong, Dubai, and NIT Delhi each during International Conferences. He’s authored a book with Springer and serving as the editor for edited volumes with respected publishers such as Elsevier, Springer, and Taylor & Francis.
Kumar Sekhar Roy is an Assistant Professor at Manipal Institute of Technology Bengaluru (MAHE) specializes in Cryptography, Network Security, and IoT Security. With a Ph.D. from NEHU, his research focuses on Post Quantum Cryptography, Secure communication, Authentication protocols, and Hardware Security. He holds expertise in Vivado, AVISPA, C, C++, and Algorithm design. Published extensively and certified in Cyber Security.
Chapter 1. Foundations of Cybersecurity.- Chapter 2. Introduction to Zero Trust.- Chapter 3. Implementing Zero Trust Networks.- Chapter 4. Zero Trust for Cloud.- Chapter 5. Compliance and Governance in Zero Trust.- Chapter 6. Applications & Case Studies of Successful Zero Trust.- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security.- Chapter 8. Challenges and Future Scope.
Chapter 1. Foundations of Cybersecurity.- Chapter 2. Introduction to Zero Trust.- Chapter 3. Implementing Zero Trust Networks.- Chapter 4. Zero Trust for Cloud.- Chapter 5. Compliance and Governance in Zero Trust.- Chapter 6. Applications & Case Studies of Successful Zero Trust.- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security.- Chapter 8. Challenges and Future Scope.
Chapter 1. Foundations of Cybersecurity.- Chapter 2. Introduction to Zero Trust.- Chapter 3. Implementing Zero Trust Networks.- Chapter 4. Zero Trust for Cloud.- Chapter 5. Compliance and Governance in Zero Trust.- Chapter 6. Applications & Case Studies of Successful Zero Trust.- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security.- Chapter 8. Challenges and Future Scope.
Chapter 1. Foundations of Cybersecurity.- Chapter 2. Introduction to Zero Trust.- Chapter 3. Implementing Zero Trust Networks.- Chapter 4. Zero Trust for Cloud.- Chapter 5. Compliance and Governance in Zero Trust.- Chapter 6. Applications & Case Studies of Successful Zero Trust.- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security.- Chapter 8. Challenges and Future Scope.