Building Secure Systems in Untrusted Networks
by
Evan Gilman, Doug Barth
Language: English
Release Date: June 19, 2017
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With...