In this internet age of security challenges and threats from cybercrime, enhanced security measures are necessary. The zero trust model―the IT security model that requires strict identity verification for every person and device trying to access resources on a private network―helps to meet these everincreasing and evolving security challenges. This new volume offers a comprehensive overview of the zero trust security model and its application in the field of cybersecurity, covering the principles, technologies, and best practices for implementing a zero trust approach, equipping readers with the knowledge and tools to secure their digital environments effectively. This book stands out by providing a holistic view of the zero trust security model, combining practical guidance for professionals with educational insights for both professionals and students and offering real-world examples and case studies that bridge the gap between learning and implementation.
"synopsis" may belong to another edition of this title.
Chetna Kaushal, PhD, is an Assistant Professor at Chitkara University, India, with 12 years of experience in research, training, and academics. She has published many research papers in international and national journals, books, and conferences, and has filed and published over 50 patents. Recognized for her contributions, she received the Patent Award in Computer Science and Engineering (2023) and the Outstanding Innovator in Education Award at the National Symposium on Innovations in Teaching and Learning Practices in Higher Education.
Amandeep Kaur, PhD, is a Professor at Chitkara University Institute of Engineering and Technology, India. With over 24 years of experience, she has about 100 publications in journals and conferences and has filed and published more than 100 patents. Dr. Kaur has won excellence awards in the category of “Filing Patent” in 2021, 2022, and 2023 and a best PhD supervision award in 2023. She is among the most prominent names among Indian researchers and is included in Stanford University’s top 2% of the world’s most influential scientists list.
Mohit Angurala, PhD, is an Assistant Professor of Computer Science at Guru Nanak Dev University College, Pathankot (a constituent college of Guru Nanak Dev University), India. Previously, he was affiliated with Chandigarh University, Vellore Institute of Technology, Khalsa College of Engineering and Technology, and Chitkara University, all in India. Dr. Angurala has published journal papers, book chapters, and books, and holds several patents. He is also an editorial board member for several journals.
Aryan Chaudhary is the Chief Scientific Advisor at BioTech Sphere Research, India. He is a keynote speaker at international and national conferences, guest editor for several journals, and is the series Editor of a CRC book series and is the editor of several books on biomedical science. He has received accolades, including the “Most Inspiring Young Leader in Healthtech Space 2022” by Business Connect and the best project leader at Global Education and Corporate Leadership.
"About this title" may belong to another edition of this title.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 50246748-n
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Hardcover. Condition: new. Hardcover. In this internet age of security challenges and threats from cybercrime, enhanced security measures are necessary. The zero trust modelthe IT security model that requires strict identity verification for every person and device trying to access resources on a private networkhelps to meet these everincreasing and evolving security challenges. This new volume offers a comprehensive overview of the zero trust security model and its application in the field of cybersecurity, covering the principles, technologies, and best practices for implementing a zero trust approach, equipping readers with the knowledge and tools to secure their digital environments effectively. This book stands out by providing a holistic view of the zero trust security model, combining practical guidance for professionals with educational insights for both professionals and students and offering real-world examples and case studies that bridge the gap between learning and implementation. Incorporates the latest advancements in cybersecurity education. It covers the fundamentals, importance, and advantages of zero trust security models; addresses the roles of AI, blockchain and machine learning play in zero trust learning and security; and looks at the different kinds of security threats and how zero trust can mitigate risk. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781779643568
Seller: AussieBookSeller, Truganina, VIC, Australia
Hardcover. Condition: new. Hardcover. In this internet age of security challenges and threats from cybercrime, enhanced security measures are necessary. The zero trust modelthe IT security model that requires strict identity verification for every person and device trying to access resources on a private networkhelps to meet these everincreasing and evolving security challenges. This new volume offers a comprehensive overview of the zero trust security model and its application in the field of cybersecurity, covering the principles, technologies, and best practices for implementing a zero trust approach, equipping readers with the knowledge and tools to secure their digital environments effectively. This book stands out by providing a holistic view of the zero trust security model, combining practical guidance for professionals with educational insights for both professionals and students and offering real-world examples and case studies that bridge the gap between learning and implementation. Incorporates the latest advancements in cybersecurity education. It covers the fundamentals, importance, and advantages of zero trust security models; addresses the roles of AI, blockchain and machine learning play in zero trust learning and security; and looks at the different kinds of security threats and how zero trust can mitigate risk. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. Seller Inventory # 9781779643568
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Seller Inventory # 409631938
Quantity: 3 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. Seller Inventory # 26404603677
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 50246748
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 50246748-n
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781779643568
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781779643568
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. New copy - Usually dispatched within 4 working days. 1070. Seller Inventory # B9781779643568
Quantity: 1 available