
Project Zero Trust
A Story About a Strategy for Aligning Security and the Business
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast

Compra ahora por $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Daniel Thomas May
Acerca de esta escucha
Implement Zero Trust initiatives efficiently and effectively
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director.
Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find:
- Concrete strategies for aligning your security practices with the business
- Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment
- Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices
Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.
©2022 John Wiley & Sons, Inc. (P)2022 Ascent AudioLos oyentes también disfrutaron...
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- De: Taimur Ijlal
- Narrado por: Craig Neutzling
- Duración: 1 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- De George en 04-14-24
De: Taimur Ijlal
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- De: Gene Kim, Jez Humble, Patrick Debois, y otros
- Narrado por: Ron Butler
- Duración: 15 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- De Anonymous User en 05-25-22
De: Gene Kim, y otros
-
The Unicorn Project
- A Novel About Developers, Digital Disruption, and Thriving in the Age of Data
- De: Gene Kim
- Narrado por: Frankie Corzo
- Duración: 12 h y 24 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Unicorn Project, we follow Maxine, a senior lead developer and architect, as she is exiled to the Phoenix Project, to the horror of her friends and colleagues, as punishment for contributing to a payroll outage. She tries to survive in what feels like a heartless and uncaring bureaucracy and to work within a system where no one can get anything done without endless committees, paperwork, and approvals. One day, she is approached by a ragtag bunch of misfits who say they want to overthrow the existing order, to liberate developers, to bring joy back to technology work.
-
-
This is no Phoenix Project
- De SaintHax en 01-10-20
De: Gene Kim
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- De: Taimur Ijlal
- Narrado por: Craig Neutzling
- Duración: 1 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- De George en 04-14-24
De: Taimur Ijlal
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- De: Gene Kim, Jez Humble, Patrick Debois, y otros
- Narrado por: Ron Butler
- Duración: 15 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- De Anonymous User en 05-25-22
De: Gene Kim, y otros
-
The Unicorn Project
- A Novel About Developers, Digital Disruption, and Thriving in the Age of Data
- De: Gene Kim
- Narrado por: Frankie Corzo
- Duración: 12 h y 24 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Unicorn Project, we follow Maxine, a senior lead developer and architect, as she is exiled to the Phoenix Project, to the horror of her friends and colleagues, as punishment for contributing to a payroll outage. She tries to survive in what feels like a heartless and uncaring bureaucracy and to work within a system where no one can get anything done without endless committees, paperwork, and approvals. One day, she is approached by a ragtag bunch of misfits who say they want to overthrow the existing order, to liberate developers, to bring joy back to technology work.
-
-
This is no Phoenix Project
- De SaintHax en 01-10-20
De: Gene Kim
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- De: Gene Kim, Kevin Behr, George Spafford
- Narrado por: Chris Ruen
- Duración: 14 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- De Peter en 11-23-15
De: Gene Kim, y otros
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
Well Aware
- Master the Nine Cybersecurity Habits to Protect Your Future
- De: George Finney
- Narrado por: Brett Barry
- Duración: 6 h y 33 m
- Versión completa
-
General
-
Narración:
-
Historia
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered - literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception - drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.
-
-
A different take on Security!
- De Naj Qazi en 07-10-23
De: George Finney
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
Beyond the Phoenix Project
- The Origins and Evolution of DevOps
- De: Gene Kim, John Willis
- Narrado por: Gene Kim, John Willis
- Duración: 7 h y 33 m
- Versión completa
-
General
-
Narración:
-
Historia
Gene Kim and John Willis present this nine-part series that includes an oral history of the DevOps movement, as well as discussion around pivotal figures and philosophies that DevOps draws upon, from Goldratt to Deming; from Lean to Safety Culture to Learning Organizations.The audiobook is a great way for listeners to take an even deeper dive into topics relevant to DevOps and leading technology organizations.
-
-
From Darwin to DevOps
- De Ethan Klitzke en 03-09-18
De: Gene Kim, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- De: Perry Carpenter, Kai Roer
- Narrado por: Perry Carpenter
- Duración: 6 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
All common sense
- De Amazon Customer en 11-28-24
De: Perry Carpenter, y otros
-
Wiring the Winning Organization
- De: Gene Kim, Steve Spear
- Narrado por: Alex Knox
- Duración: 10 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
In their eagerly awaited book, Kim and Spear bring to light a new theory of high-achieving organizations. They examine how companies solve the most important problems better, faster, and easier than their competitors by quickly and regularly closing the gap between aspirations and real-world success. This book teaches companies that are struggling to perform how to achieve the continual greatness seen in the best of the best.
-
-
Powerful tools and a insights
- De Sean Brooks en 04-06-24
De: Gene Kim, y otros
Relacionado con este tema
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- De: Sara Wachter-Boettcher
- Narrado por: Andrea Emmes
- Duración: 5 h y 42 m
- Versión completa
-
General
-
Narración:
-
Historia
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- De Casey en 10-29-17
-
Where Wizards Stay Up Late
- The Origins of the Internet
- De: Katie Hafner, Matthew Lyon
- Narrado por: Mark Douglas Nelson
- Duración: 10 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Twenty-five years ago, it didn't exist. Today, 20 million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960s, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices.
-
-
Absolutely fascinating and we'll researched
- De Elsa Braun en 10-01-16
De: Katie Hafner, y otros
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- De: Micah Solomon
- Narrado por: Micah Solomon, Sean Pratt
- Duración: 6 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- De Nick Morgan en 04-30-13
De: Micah Solomon
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
Exceptional Service, Exceptional Profit
- The Secrets of Building a Five-Star Customer Service Organization
- De: Leonardo Inghilleri, Micah Solomon
- Narrado por: Sean Pratt
- Duración: 5 h y 39 m
- Versión completa
-
General
-
Narración:
-
Historia
In a tight market, your most powerful growth engine - and your best protection from competitive inroads - is this: Put everything you can into cultivating true customer loyalty. Loyal customers are less sensitive to price competition, more forgiving of small glitches, and, ultimately, become "walking billboards" who will happily promote your brand.
In Exceptional Service, Exceptional Profit, insiders Leonardo Inghilleri and Micah Solomon reveal the secrets of providing online and offline customer service so superior it nearly guarantees loyalty.
-
-
Great book, recommended!
- De KLD en 07-03-15
De: Leonardo Inghilleri, y otros
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Technically Wrong
- Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
- De: Sara Wachter-Boettcher
- Narrado por: Andrea Emmes
- Duración: 5 h y 42 m
- Versión completa
-
General
-
Narración:
-
Historia
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed, or why. It's time we change that. Many of the services we rely on are full of oversights, biases, and downright ethical nightmares. Chatbots that harass women. Signup forms that fail anyone who's not straight. Social media sites that send peppy messages about dead relatives. Algorithms that put more black people behind bars.
-
-
Pretty good but not complete
- De Casey en 10-29-17
-
Where Wizards Stay Up Late
- The Origins of the Internet
- De: Katie Hafner, Matthew Lyon
- Narrado por: Mark Douglas Nelson
- Duración: 10 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Twenty-five years ago, it didn't exist. Today, 20 million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960s, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices.
-
-
Absolutely fascinating and we'll researched
- De Elsa Braun en 10-01-16
De: Katie Hafner, y otros
-
High-Tech, High-Touch Customer Service
- Inspire Timeless Loyalty in the Demanding New World of Social Commerce
- De: Micah Solomon
- Narrado por: Micah Solomon, Sean Pratt
- Duración: 6 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In an age of Twitter, smartphones, and self-service kiosks, high-tech but still high-touch customer service is the answer. Today’s customers are a hard bunch to crack. Time-strapped, screen-addicted, value-savvy, and socially engaged, their expectations are tougher than ever for a business to keep up with. They are empowered like never before and expect businesses to respect that sense of empowerment - lashing out at those that don’t. Take heart: Old-fashioned customer service, fully retooled for today’s blistering pace and digitally connected reality, is what you need to build the kind of loyal customer base that allows you to survive - and thrive.
-
-
This is the book that cracks the code!
- De Nick Morgan en 04-30-13
De: Micah Solomon
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
Exceptional Service, Exceptional Profit
- The Secrets of Building a Five-Star Customer Service Organization
- De: Leonardo Inghilleri, Micah Solomon
- Narrado por: Sean Pratt
- Duración: 5 h y 39 m
- Versión completa
-
General
-
Narración:
-
Historia
In a tight market, your most powerful growth engine - and your best protection from competitive inroads - is this: Put everything you can into cultivating true customer loyalty. Loyal customers are less sensitive to price competition, more forgiving of small glitches, and, ultimately, become "walking billboards" who will happily promote your brand.
In Exceptional Service, Exceptional Profit, insiders Leonardo Inghilleri and Micah Solomon reveal the secrets of providing online and offline customer service so superior it nearly guarantees loyalty.
-
-
Great book, recommended!
- De KLD en 07-03-15
De: Leonardo Inghilleri, y otros
-
Joy, Inc.
- How We Built a Workplace People Love
- De: Richard Sheridan
- Narrado por: Tim Andres Pabon
- Duración: 7 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Joy, Inc. offers an inside look at how Sheridan and Menlo created a joyful culture, and shows how any organization can follow their methods for a more passionate team and sustainable, profitable results. Sheridan also shows how to run smarter meetings and build cultural training into your hiring process. Joy, Inc. offers an inspirational blueprint for listeners in any field who want a committed, energizing atmosphere at work - leading to sustainable business results.
-
-
Hey Menlo.
- De Stacey Colón en 03-25-16
De: Richard Sheridan
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
-
The Friendly Orange Glow
- The Untold Story of the PLATO System and the Dawn of Cyberculture
- De: Brian Dear
- Narrado por: George Newbern
- Duración: 21 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
At a time when Steve Jobs was only a teenager and Mark Zuckerberg wasn't even born, a group of visionary engineers and designers - some of them only high school students - in the late 1960s and 1970s created a computer system called PLATO, which was not only years but light-years ahead in experimenting with how people would learn, engage, communicate, and play through connected computers.
-
-
Memory lane for the cyberist.
- De Robert C. Hickcox en 08-08-18
De: Brian Dear
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
The Starfish and the Spider
- The Unstoppable Power of Leaderless Organizations
- De: Ori Brafman, Rod Beckstrom
- Narrado por: Sean Pratt
- Duración: 5 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
If you cut off a spider's leg, it's crippled; if you cut off its head, it dies. But if you cut off a starfish's leg it grows a new one, and the old leg can grow into an entirely new starfish. The Starfish and the Spider argues that organizations fall into two categories: "spiders", which have a rigid hierarchy, and "starfish", which rely on the power of peer relationships.
-
-
Centralized and decentralized models
- De Chan Meng en 12-07-07
De: Ori Brafman, y otros
-
Open
- How Compaq Ended IBM's PC Domination and Helped Invent Modern Computing
- De: Rod Canion
- Narrado por: Paul Boehmer
- Duración: 6 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Open provides valuable lessons in leadership in times of crisis, management decision-making under the pressure of extraordinary growth, and the power of a unique, pervasive culture. Open tells the incredible story of Compaq’s meteoric rise from humble beginnings to become the PC industry leader in just over a decade. Along the way, Compaq helped change the face of computing while establishing the foundation for today’s world of tablets and smart phones.
-
-
Wrong narrator for this book
- De Wick Smith en 07-13-14
De: Rod Canion
Las personas que vieron esto también vieron...
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- De: Taimur Ijlal
- Narrado por: Craig Neutzling
- Duración: 1 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- De George en 04-14-24
De: Taimur Ijlal
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- De: L.D. Knowings
- Narrado por: KC Wayman
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
A Blueprint for Secure Networks
- De Madeline Mcgee en 03-16-24
De: L.D. Knowings
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- De: Razi Rais, Christina Morillo, Evan Gilman, y otros
- Narrado por: Mike Chamberlain
- Duración: 12 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
De: Razi Rais, y otros
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- De: Bruce Schneier
- Narrado por: Dan John Miller
- Duración: 8 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
Too Much Political Bias
- De Dreux en 02-18-23
De: Bruce Schneier
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- De: Taimur Ijlal
- Narrado por: Craig Neutzling
- Duración: 1 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- De George en 04-14-24
De: Taimur Ijlal
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- De: L.D. Knowings
- Narrado por: KC Wayman
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
A Blueprint for Secure Networks
- De Madeline Mcgee en 03-16-24
De: L.D. Knowings
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- De: Razi Rais, Christina Morillo, Evan Gilman, y otros
- Narrado por: Mike Chamberlain
- Duración: 12 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
De: Razi Rais, y otros
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- De: Bruce Schneier
- Narrado por: Dan John Miller
- Duración: 8 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.
-
-
Too Much Political Bias
- De Dreux en 02-18-23
De: Bruce Schneier
-
Zero Trust Architecture
- Networking Technology: Security
- De: Cindy Green-Ortiz, Brandon Fowler, David Houck, y otros
- Narrado por: Alex Freeman
- Duración: 11 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
De: Cindy Green-Ortiz, y otros
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- De: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrado por: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Duración: 12 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- De Silvershopper en 01-18-23
De: Laurent Richard, y otros
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrado por: Tom Parks
- Duración: 65 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
-
Passed the CISSP exam
- De Ollie en 12-30-23
De: Mike Chapple, y otros
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
Beyond the Phoenix Project
- The Origins and Evolution of DevOps
- De: Gene Kim, John Willis
- Narrado por: Gene Kim, John Willis
- Duración: 7 h y 33 m
- Versión completa
-
General
-
Narración:
-
Historia
Gene Kim and John Willis present this nine-part series that includes an oral history of the DevOps movement, as well as discussion around pivotal figures and philosophies that DevOps draws upon, from Goldratt to Deming; from Lean to Safety Culture to Learning Organizations.The audiobook is a great way for listeners to take an even deeper dive into topics relevant to DevOps and leading technology organizations.
-
-
From Darwin to DevOps
- De Ethan Klitzke en 03-09-18
De: Gene Kim, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- De: Gene Kim, Jez Humble, Patrick Debois, y otros
- Narrado por: Ron Butler
- Duración: 15 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- De Anonymous User en 05-25-22
De: Gene Kim, y otros
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- De: Douglas W. Hubbard, Richard Seiersen
- Narrado por: Jim Seybert
- Duración: 14 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
De: Douglas W. Hubbard, y otros
-
Certified Information Security Manager CISM Study Guide
- De: Mike Chapple PhD CISM
- Narrado por: Daniel Henning
- Duración: 19 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- De: Geoff White
- Narrado por: Geoff White
- Duración: 8 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
Propagandistic tone
- De Philippe Delteil en 04-17-23
De: Geoff White
Lo que los oyentes dicen sobre Project Zero Trust
Con calificación alta para:
Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Naj Qazi
- 10-17-23
Amazing book on ZT
It's a fantastic book on the concept of Zero Trust. George is a master storyteller. It's an exciting book complete with business and technical perspectives. Striking a perfect balance between the two is hard to achieve, and George has done it with a swagger!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Dan
- 09-02-23
Zero Trust is not just a marketing term.. who knew?
I am an IT security professional and thought zero trust was just a generic marketing term - this fictional story of a company implementing zero trust in their environment goes a long way in helping others understand what it is and what it isn’t. The key part is zero trust has to be tailored to each organization and follow certain principles… best IT security book I’ve heard in a long time.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 01-19-23
Excellent for understanding zero trust concepts
Zero Trust can be a complicated concept to wrap your head around. Project Zero Trust puts things in perspective by taking you through a journey of implementing zero trust at a fictional company. Throughout the book, you'll learn not just the concepts of zero trust but also how those concepts interact with real-world scenarios.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- S Hatch
- 06-15-23
I'd prefer to read this one
Kudo's to the George and John! Great story that covers all the bases in real-world scenarios.
However, as more characters are developed the audio version starts to become like nails on a chalkboard because some of the voices are so incongruent with the characters.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Jordan
- 10-16-22
This one will be a classic
Cybersecurity aside, this is just a great story. It’s written in a style similar to The E-myth, another good story coupled short and dense takeaways.
It almost feels like I went through an internship at MarchFit, and I’m much more confident with both selling the idea and leading the implementation of Zero Trust.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 2 personas
-
Total
-
Ejecución
-
Historia
- Nick A.
- 11-30-22
This is a must hear/read
Probably one of the most critical listening audiobooks I came accross the last 1-2 years. The story is amazing though I would prefer multiple narrators to create a better atmosphere of the conversations. Nevertheless the scenario can easily being a carbon copy of real world. I think this will be a classic and I hope for a future title 2.0. The book/eBook/audobook should be a must for reference on any security practitioner.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Voytek
- 09-06-24
Project phoenix for security
Easy to listen to, not too long and rather comprehensive overview of various areas of cyber security. Generally a good introduction to the zero trust philosophy.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Andreas Andersen
- 02-07-24
The Unicorn Project, but for security.
Similar to "The Phoenix Project" although not as good, like "The Unicorn Project" the hard challenges are not described well enough - the characters goes through the implementation of Zero Trust a bit too easily.
Authorization and authentication is only briefly discussed despite being central to the concepts.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Cory
- 01-09-24
Amazing
Wonderful read, very educational and engaging, which is not easy to do! Highly recommended for anyone interested in cybersecurity
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- DMV Kev
- 01-10-24
Zero Trust Example Implementation
I enjoyed listening to this book and examples given on implementing Zero Trust. The concept of Zero Trust seemed confusing on the surface. However, after reading this book, my takeaway is Zero Trust focuses on breaking down internal network trust relationships and implementing stricter security controls and observability for internal communications.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña