語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The cybersecurity mesh architecture : = composable, flexible, and scalable security approach for a resilient security ecosystem /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
The cybersecurity mesh architecture :/ Tarun Kumar.
其他題名:
composable, flexible, and scalable security approach for a resilient security ecosystem /
作者:
Kumar, Tarun.
面頁冊數:
1 online resource (212 pages)
標題:
COMPUTERS / Security / Network Security. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000679.html
ISBN:
9789365891218
The cybersecurity mesh architecture : = composable, flexible, and scalable security approach for a resilient security ecosystem /
Kumar, Tarun.
The cybersecurity mesh architecture :
composable, flexible, and scalable security approach for a resilient security ecosystem /Tarun Kumar. - 1 online resource (212 pages)
Includes bibliographical references and index.
The cybersecurity mesh architecture : composable, flexible, and scalable security approach for a resilient security ecosystem -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- 1. Cybersecurity: A Dynamic Changing Paradigm -- 2. Cybersecurity: Understanding Today’s Security Challenges -- 3. Emerging Cybersecurity Trends -- 4. The Need for Cybersecurity Mesh Architecture -- 5. Fundamental Components of Cybersecurity Mesh Architecture -- 6. How to Effectively Adopt Cybersecurity Mesh Architecture -- 7. Benefits of Adopting Cybersecurity Mesh Architecture -- 8. CSMA Best Practices -- 9. Potential Outlook for CSMA Adoption -- Index.
Access restricted to authorized users and institutions.
Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape, explaining CSMA and its key components, benefits, and adoption strategies. It covers best practices, implementation challenges, and key performance indicators (KPIs) for evaluating CSMA effectiveness. Additionally, it compares CSMA with traditional defense methods, detailing its advantages. The book also explores its specific applications in the healthcare sector. It provides valuable insights into the CSMA market, including growth factors, dynamics, and emerging opportunities for businesses looking to enhance their cybersecurity posture.
Mode of access: World Wide Web.
ISBN: 9789365891218Subjects--Topical Terms:
1483836
COMPUTERS / Security / Network Security.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
The cybersecurity mesh architecture : = composable, flexible, and scalable security approach for a resilient security ecosystem /
LDR
:02607nam a2200289 i 4500
001
1157337
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789365891218
020
$a
9789365897180
035
$a
BPB0000679
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Kumar, Tarun.
$3
1483946
245
1 4
$a
The cybersecurity mesh architecture :
$b
composable, flexible, and scalable security approach for a resilient security ecosystem /
$c
Tarun Kumar.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2025
300
$a
1 online resource (212 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
The cybersecurity mesh architecture : composable, flexible, and scalable security approach for a resilient security ecosystem -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- 1. Cybersecurity: A Dynamic Changing Paradigm -- 2. Cybersecurity: Understanding Today’s Security Challenges -- 3. Emerging Cybersecurity Trends -- 4. The Need for Cybersecurity Mesh Architecture -- 5. Fundamental Components of Cybersecurity Mesh Architecture -- 6. How to Effectively Adopt Cybersecurity Mesh Architecture -- 7. Benefits of Adopting Cybersecurity Mesh Architecture -- 8. CSMA Best Practices -- 9. Potential Outlook for CSMA Adoption -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape, explaining CSMA and its key components, benefits, and adoption strategies. It covers best practices, implementation challenges, and key performance indicators (KPIs) for evaluating CSMA effectiveness. Additionally, it compares CSMA with traditional defense methods, detailing its advantages. The book also explores its specific applications in the healthcare sector. It provides valuable insights into the CSMA market, including growth factors, dynamics, and emerging opportunities for businesses looking to enhance their cybersecurity posture.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000679.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入