Use coupon code “SUMMER20” for a 20% discount on all items! Valid until 2024-08-31

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      The Zero Trust Framework: Threat Hunting & Quantum Mechanics

      1 in stock

      Firm sale: non returnable item
      SKU 9781032492780 Categories ,
      Select Guide Rating
      In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.

      The Cybersecurity...

      £48.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781032492780
      Product Form:Hardback
      Country of Manufacture:GB
      Title:The Zero Trust Framework
      Subtitle:Threat Hunting & Quantum Mechanics
      Authors:Author: Ravindra Das
      Page Count:146
      Subjects:Coding theory and cryptology, Coding theory & cryptology, Crime and criminology, Economics, Hospitality and service industries, Legal aspects of criminology, Mathematical logic, Digital and information technologies: Legal aspects, Privacy and data protection, Computer fraud and hacking, Computer science, Crime & criminology, Economics, Security services, Criminology: legal aspects, Mathematical logic, Legal aspects of IT, Privacy & data protection, Computer fraud & hacking, Computer science
      Description:Select Guide Rating
      In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.

      The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning.

      Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things.

      So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time.

      The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA).

      In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.


      Imprint Name:CRC Press
      Publisher Name:Taylor & Francis Ltd
      Country of Publication:GB
      Publishing Date:2023-05-25

      Additional information

      Weight290 g
      Dimensions222 × 144 × 16 mm