Preventing Breaches by Eliminating Secrets and Adopting Zero Trust
Description
In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity.
I have a question about the book:
‘Identity-Native Infrastructure Access Management - Kontsevoy, Ev, Shah, Sakshyam, Conrad, Peter’.
Fill in the form below.
We will respond as fast as possible.