|
|
|
|
LEADER |
03323nam a2200469 4500 |
001 |
978-1-4842-5431-8 |
003 |
DE-He213 |
005 |
20191130095724.0 |
007 |
cr nn 008mamaa |
008 |
191130s2019 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484254318
|9 978-1-4842-5431-8
|
024 |
7 |
|
|a 10.1007/978-1-4842-5431-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Keeriyattil, Sreejith.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Zero Trust Networks with VMware NSX
|h [electronic resource] :
|b Build Highly Secure Network Architectures for Your Data Centers /
|c by Sreejith Keeriyattil.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2019.
|
300 |
|
|
|a XVIII, 183 p. 150 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter 1: Network Defense Architecture -- Chapter 2: Microsegmentation and Zero Trust: Introduction -- Chapter 3: Zero Trust Networks with VMware NSX: Getting Started -- Chapter 4: NSX Service Composer and Third-Party Integration -- Chapter 5: Bird's-Eye View of a Zero Trust Network -- Chapter 6: NSX REST API and Power NSX -- Chapter 7: NSX Log Insight and Network Insight -- Chapter 8: VMware NSX/Airwatch and Conclusion.
|
520 |
|
|
|a Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center. Author Sreerjith Keeriyattil teaches you how micro-segmentation can be used to protect east-west traffic. Insight is provided into working with Service Composer and using NSX REST API to automate firewalls. You will analyze flow and security threats to monitor firewalls using VMware Log and see how Packet Flow works with VMware NSX micro-segmentation. The information presented in Zero Trust Networks with VMware NSX allows you to study numerous attack scenarios and strategies to stop these attacks, and know how VMware Air Watch can further improve your architecture. You will: Know how micro-segmentation works and its benefits Implement VMware-distributed firewalls Automate security policies Integrate IPS/IDS with VMware NSX Analyze your firewall's configurations, rules, and policies.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Computer Applications.
|0 http://scigraph.springernature.com/things/product-market-codes/I23001
|
650 |
2 |
4 |
|a Enterprise Architecture.
|0 http://scigraph.springernature.com/things/product-market-codes/522010
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484254301
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484254325
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4842-5431-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|