Buy new:
£47.99£47.99
£13.14 delivery Friday, 27 December
Dispatches from: Amazon Sold by: Amazon
Save with Used - Very Good
£23.99£23.99
£13.14 delivery Monday, 30 December
Dispatches from: Amazon Sold by: Save The Books
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet or computer – no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Zero Trust Networks: Building Secure Systems in Untrusted Networks Paperback – 30 Jun. 2017
There is a newer edition of this item:
Purchase options and add-ons
- ISBN-109781491962190
- ISBN-13978-1491962190
- Edition1st
- PublisherO′Reilly
- Publication date30 Jun. 2017
- LanguageEnglish
- Dimensions17.78 x 1.27 x 24.13 cm
- Print length240 pages
Frequently bought together

What do customers buy after viewing this item?
Best Selling
in this set of products
Highest rated
in this set of products
Lowest Price
in this set of products
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining SystemsHeather AdkinsPaperback£15.52 delivery
Product description
About the Author
Product details
- ASIN : 1491962194
- Publisher : O′Reilly; 1st edition (30 Jun. 2017)
- Language : English
- Paperback : 240 pages
- ISBN-10 : 9781491962190
- ISBN-13 : 978-1491962190
- Dimensions : 17.78 x 1.27 x 24.13 cm
- Best Sellers Rank: 645,183 in Books (See Top 100 in Books)
- 932 in Computer Information Systems
- 3,427 in Web Administration
- Customer reviews:
About the authors

Discover more of the author’s books, see similar authors, read book recommendations and more.

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings, help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from United Kingdom
There was a problem filtering reviews right now. Please try again later.
- Reviewed in the United Kingdom on 18 December 2021This book is terrific. Easy to read and digest, but full of good insights and value. It's not tactical - in that it won't tell you how to implement zero trust in any given stack or cloud, but it offers a terrific grounding in the philosophy and strategies that are the foundation of a zero trust network. Well worth reading for anyone interested in network security.
- Reviewed in the United Kingdom on 10 June 2020This book balances extremely technical content, with easy to understand explanations and visual representations to explain the concept of creating secure silos, within corporate networks.
If you are seeking to make life more difficult for today's cyber criminals, to move laterally through your corporate network, I would recommend that you add this to your reference library.
- Reviewed in the United Kingdom on 18 April 2019Really interesting book - I'm a Solution Architect and certainly found it beneficial for my role.
- Reviewed in the United Kingdom on 15 November 2018Very thin paper used for book, and it is a slim volume, but concepts well explained.
Top reviews from other countries
MilesReviewed in the Netherlands on 9 November 20243.0 out of 5 stars You can learn this information for free on the internet
Nothing that you would earn a new perspective or knowledge. Almost all if not all the information is readily accessible on the internet.
SmoothOperatorReviewed in the United States on 17 February 20205.0 out of 5 stars deFacto Reference Guide for Understanding and Building a Zero Trust Network
This book is perhaps the first complete commercial publication on this topic. It describes and characterizes the ZTN without prescribing a specific technology implementation. This book is a must-read for understanding the basis of an implementation and for balancing the claims of a vendor. At 216 pages it is packed with information; it might take a while to absorb fully the rich content. For me, it is best to absorb it in small chunks over an extended period of time.
Of the 10 chapters, a particularly juicy one is chapter 8 "Trusting the Traffic" that explains networking fundamentals along with a detailed analysis of encryption; notably TLS and IPSEC. Chapter 6 "Trusting Users" conveys some heavy details of Identification and Authentication along with an emphasis on the need to create trusted hardware.
For a person who participates in securing computer networks or has a desire to understand network security protocols in details, this book is a great read. For the fullest effect it is not a quick read but it has much to teach.
-
JessicaReviewed in Italy on 13 January 20205.0 out of 5 stars Ottimo
In ottimo stato, come da descrizione.
FredReviewed in France on 14 January 20193.0 out of 5 stars A good book for beginners
If you want to explore ZeroTrust networks, you may rather go on the net and see the state of the art implementations. That one is more theoretical.
Kindle CustomerReviewed in India on 27 December 20185.0 out of 5 stars Compelling content for cyber security professionals
Access being a new threat plane, it is worth exploring ZTS and this book is a very good starting point.

