Zero Trust Security: A Hands-on Guide

Zero Trust Security: A Hands-on Guide book cover

Zero Trust Security: A Hands-on Guide

Author(s): Adam Tilmar Jakobsen (Author)

  • Publisher finelybook 出版社: Wiley
  • Publication Date 出版日期: February 3, 2026
  • Edition 版本: 1st
  • Language 语言: English
  • Print length 页数: 224 pages
  • ISBN-10: 1394361092
  • ISBN-13: 9781394361090

Book Description

Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach

Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and practical approach. Following the journey of a fictional manufacturing company, readers learn how to go from a flat network into a robust Zero Trust architecture. Through step-by-step implementations, the book demonstrates the essential elements of modern security architecture.

Each chapter provides both theoretical understanding and practical implementation guidance. The included Docker environments and configuration files enable readers to practice implementations in a safe environment, making complex security concepts tangible and actionable. For readers just beginning their Zero Trust journey or enhancing existing security controls, this guide offers actionable insights to build a more resilient security architecture.

Additional topics explored in Zero Trust Security include:

  • Why perimeter security is inefficient, why Zero Trust projects fail, and how to implement Zero Trust correctly and effectively
  • Installation and use of Docker Compose and understanding of Docker Compose .yml files
  • Elements of network segmentation including physical and logical segmentation and key technologies
  • Techniques for network monitoring such as network taps, switch port analyzers (SPAN), and encrypted traffic
  • Identity access management (IAM), covering credential rotation, multi-factor authentication, and single sign-on (SSO)

Zero Trust Security is an essential resource on the subject for IT managers, security architects, DevOps engineers, compliance officers, and cyber security practitioners. The book is also highly valuable for students in related programs of study seeking to understand the latest developments in the field.

From the Back Cover

Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach

Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and practical approach. Following the journey of a fictional manufacturing company, readers learn how to go from a flat network into a robust Zero Trust architecture. Through step-by-step implementations, the book demonstrates the essential elements of modern security architecture.

Each chapter provides both theoretical understanding and practical implementation guidance. The included Docker environments and configuration files enable readers to practice implementations in a safe environment, making complex security concepts tangible and actionable. For readers just beginning their Zero Trust journey or enhancing existing security controls, this guide offers actionable insights to build a more resilient security architecture.

Additional topics explored in Zero Trust Security include:

  • Why perimeter security is inefficient, why Zero Trust projects fail, and how to implement Zero Trust correctly and effectively
  • Installation and use of Docker Compose and understanding of Docker Compose .yml files
  • Elements of network segmentation including physical and logical segmentation and key technologies
  • Techniques for network monitoring such as network taps, switch port analyzers (SPAN), and encrypted traffic
  • Identity access management (IAM), covering credential rotation, multi-factor authentication, and single sign-on (SSO)

Zero Trust Security is an essential resource on the subject for IT managers, security architects, DevOps engineers, compliance officers, and cyber security practitioners. The book is also highly valuable for students in related programs of study seeking to understand the latest developments in the field.

About the Author

Adam Tilmar Jakobsen is a Cyber Security Consultant working with the Danish government. He started his career as a Cyber Specialist for Danish Army Intelligence, where he worked with different single-source divisions on expanding the usage of cyber, with a focus on SIGINT, OSINT, and all-source intelligence. He then joined Blue Water Shipping, a major shipping company in Denmark, where he worked in information security, handling the full operation pipeline.

Amazon Page

下载地址

EPUB, PDF(conv) | 16 MB | 2025-12-15
下载地址 Download解决验证以访问链接!
打赏
未经允许不得转载:finelybook » Zero Trust Security: A Hands-on Guide

评论 抢沙发

觉得文章有用就打赏一下文章作者

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫