|
Showing 1 - 2 of
2 matches in All Departments
This book recounts the World War II journeys of a soldier, a ship,
and a bottle of spirits through, and around, five great
turning-point battles. Those battles were influenced more by
geography and climate than by generals and admirals. Properly
titled they would be known as the Battles of the Sky (Britain), the
Sand (El Alemein), the Snow (Stalingrad), the Sea (North Atlantic),
and the Shore (Normandy). Slogging their way through this quintet
are an eighteen-year-old G.I. from Missouri (as seen through his
letters home), an "ugly duckling" of a Liberty ship (as seen
through its Armed Guard reports), and a bottle of rum (as traced by
those who, after the war, made money in selling war souvenirs). It
is the history of the North Atlantic sea basin and its extensions
at war: the story of the lulls between battles, when America's
teenage warriors often watched war movies (Humphrey Bogart made and
Warner Brothers released seven during the war), sang or listened to
popular tunes by songsmiths like Irving Berlin, and drank
rum-and-Coke (while listening to Dick Haymes sing the hit "Rum
& Coca-Cola"). While accessible and vastly entertaining, this
is a serious work of history. By treating World War II in Europe
much as Fernand Braudel treated the origins of Western civilization
in his masterpiece The Mediterranean and the Mediterranean World in
the Age of Philip II, Hatcher brings Braudelian detachment to his
narrative.
|
Zero Trust Architecture (Paperback)
Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, …
|
R1,950
R1,178
Discovery Miles 11 780
Save R772 (40%)
|
Ships in 12 - 17 working days
|
Today's organizations need a new security model that more
effectively adapts to the complexity and risks of modern
environments, embraces hybrid workplaces, and protects people,
devices, apps, and data wherever they're located. Zero Trust is the
first model with the potential to do all that. Zero Trust
Architecture: Theory, Implementation, Maintenance, and Growth is
the first comprehensive guide for architects, engineers, and other
technical professionals who want to move from Zero Trust theory to
implementation and successful ongoing operation. A team of Cisco's
leading experts and implementers offer the most comprehensive and
substantive guide to Zero Trust, bringing clarity, vision,
practical definitions, and real-world expertise to a space that's
been overwhelmed with hype. The authors explain why Zero Trust
identity-based models can enable greater flexibility, simpler
operations, intuitive context in the implementation and management
of least privilege security. Then, building on Cisco's own model,
they systematically illuminate methodologies, supporting
technologies, and integrations required on the journey to any Zero
Trust identity-based model. Through real world experiences and case
study examples, you'll learn what questions to ask, how to start
planning, what exists today, what solution components still must
emerge and evolve, and how to drive value in the short-term as you
execute on your journey towards Zero Trust.
|
|