語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privileged access management = strat...
~
Rasner, Gregory C.
FindBook
Google Book
Amazon
博客來
Privileged access management = strategies for zero trust in the enterprise /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Privileged access management/ by Gregory C. Rasner, Maria C. Rasner.
其他題名:
strategies for zero trust in the enterprise /
作者:
Rasner, Gregory C.
其他作者:
Rasner, Maria C.
出版者:
Berkeley, CA :Apress : : 2025.,
面頁冊數:
xv, 284 p. :ill., digital ;24 cm.
內容註:
Chapter 1: Privileged Access Management: The Essentials- Chapter 2: Zero Trust: Origins and Evolutions -- Chapter 3: Assessments and Solutions -- Chapter 4: PAM Governance -- Chapter 5: Blueprint for Successfull Implementation -- Chapter 6: Conclusion.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/979-8-8688-1431-0
ISBN:
9798868814310
Privileged access management = strategies for zero trust in the enterprise /
Rasner, Gregory C.
Privileged access management
strategies for zero trust in the enterprise /[electronic resource] :by Gregory C. Rasner, Maria C. Rasner. - Berkeley, CA :Apress :2025. - xv, 284 p. :ill., digital ;24 cm.
Chapter 1: Privileged Access Management: The Essentials- Chapter 2: Zero Trust: Origins and Evolutions -- Chapter 3: Assessments and Solutions -- Chapter 4: PAM Governance -- Chapter 5: Blueprint for Successfull Implementation -- Chapter 6: Conclusion.
Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into. Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors. What You Will Learn: The foundations of Zero Trust security and Privileged Access Management. Tie-ins to the ZT strategy and discussions about successful implementation with strategy and governance. How to assess your security landscape including current state, risk-based gaps, tool and technology selection, and assessment output. A step-by-step strategy for Implementation, including planning, execution, governance, and root-cause analysis. Who This Book is for: C-level suite: not designed to be overly technical, but cover material enough to allow this level to be conversant in strategy and leadership needs to success. Director-level in Cyber and IT: this level of personnel are above the individual contributors (IC) and require the information in this book to translate the strategy goals set by C-suite and the tactics required for the ICs to implement and govern. GRC leaders and staff. Individual Contributors: while not designed to be a technical manual for engineering staff, it does provide a Rosetta Stone for themto understand how important strategy and governance are to their success.
ISBN: 9798868814310
Standard No.: 10.1007/979-8-8688-1431-0doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / R37 2025
Dewey Class. No.: 005.8
Privileged access management = strategies for zero trust in the enterprise /
LDR
:03298nmm a2200349 a 4500
001
2414053
003
DE-He213
005
20250715124741.0
006
m d
007
cr nn 008maaau
008
260205s2025 cau s 0 eng d
020
$a
9798868814310
$q
(electronic bk.)
020
$a
9798868814303
$q
(paper)
024
7
$a
10.1007/979-8-8688-1431-0
$2
doi
035
$a
979-8-8688-1431-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
R37 2025
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
R225 2025
100
1
$a
Rasner, Gregory C.
$3
3790520
245
1 0
$a
Privileged access management
$h
[electronic resource] :
$b
strategies for zero trust in the enterprise /
$c
by Gregory C. Rasner, Maria C. Rasner.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2025.
300
$a
xv, 284 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Privileged Access Management: The Essentials- Chapter 2: Zero Trust: Origins and Evolutions -- Chapter 3: Assessments and Solutions -- Chapter 4: PAM Governance -- Chapter 5: Blueprint for Successfull Implementation -- Chapter 6: Conclusion.
520
$a
Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into. Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors. What You Will Learn: The foundations of Zero Trust security and Privileged Access Management. Tie-ins to the ZT strategy and discussions about successful implementation with strategy and governance. How to assess your security landscape including current state, risk-based gaps, tool and technology selection, and assessment output. A step-by-step strategy for Implementation, including planning, execution, governance, and root-cause analysis. Who This Book is for: C-level suite: not designed to be overly technical, but cover material enough to allow this level to be conversant in strategy and leadership needs to success. Director-level in Cyber and IT: this level of personnel are above the individual contributors (IC) and require the information in this book to translate the strategy goals set by C-suite and the tactics required for the ICs to implement and govern. GRC leaders and staff. Individual Contributors: while not designed to be a technical manual for engineering staff, it does provide a Rosetta Stone for themto understand how important strategy and governance are to their success.
650
0
$a
Computer security.
$3
540555
650
0
$a
Computers
$x
Access control.
$3
584008
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Privacy.
$3
528582
700
1
$a
Rasner, Maria C.
$3
3790521
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-1431-0
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519508
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 R37 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入