Zero trust security : (Record no. 11087)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01130nam a22002537i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250820114716.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250723s |||ao||fr|||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9789355512512 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-GaU |
| Transcribing agency | EG-GaU |
| Modifying agency | EG-GaU |
| Description conventions | rda |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Edition number | 23 |
| Classification number | 006.6 |
| Item number | A.N.Z |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Andravous, Nike, |
| Relator term | author. |
| 9 (RLIN) | 63102 |
| 245 10 - TITLE STATEMENT | |
| Title | Zero trust security : |
| Remainder of title | A complete guide / |
| Statement of responsibility, etc. | Nike Andravous. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 1st edition. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Place of production, publication, distribution, manufacture | New Delhi : |
| Name of producer, publisher, distributor, manufacturer | BPB Publications, |
| Date of production, publication, distribution, manufacture, or copyright notice | 2024. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 261 pages : |
| Other physical details | illustrations ; |
| Dimensions | 21 cm. |
| 336 ## - CONTENT TYPE | |
| Source | rdacontent |
| Content type term | text |
| Content type code | txt |
| 337 ## - MEDIA TYPE | |
| Source | rdamedia |
| Media type term | unmediated |
| Media type code | n |
| 338 ## - CARRIER TYPE | |
| Source | rdacarrier |
| Carrier type term | volume |
| Carrier type code | nc |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | A practical introduction to the Zero Trust security model, covering principles such as “never trust, always verify,” least-privilege, micro-segmentation, and continuous validation. Ideal for IT professionals seeking a foundational understanding of modern cybersecurity approaches. <br/> |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security |
| General subdivision | Standards. |
| 9 (RLIN) | 11868 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Network security |
| General subdivision | Standards. |
| 9 (RLIN) | 60482 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Media and mass communication Library | Media and mass communication Library | C1 | 08/20/2025 | 006.6 A.N.Z | MA0002444 | 08/20/2025 | C.1 | 08/20/2025 | Books |