{"title":"Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers","authors":"Sreejith Keeriyattil","doi":"10.1007/978-1-4842-5431-8","DOIUrl":"https://doi.org/10.1007/978-1-4842-5431-8","url":null,"abstract":"","PeriodicalId":360785,"journal":{"name":"Zero Trust Networks with VMware NSX","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116522990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NSX Service Composer and Third-Party Integration","authors":"Sreejith Keeriyattil","doi":"10.1007/978-1-4842-5431-8_4","DOIUrl":"https://doi.org/10.1007/978-1-4842-5431-8_4","url":null,"abstract":"","PeriodicalId":360785,"journal":{"name":"Zero Trust Networks with VMware NSX","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The NSX REST API and PowerNSX","authors":"Sreejith Keeriyattil","doi":"10.1007/978-1-4842-5431-8_6","DOIUrl":"https://doi.org/10.1007/978-1-4842-5431-8_6","url":null,"abstract":"","PeriodicalId":360785,"journal":{"name":"Zero Trust Networks with VMware NSX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114179518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microsegmentation and Zero Trust: Introduction","authors":"Sreejith Keeriyattil","doi":"10.1007/978-1-4842-5431-8_2","DOIUrl":"https://doi.org/10.1007/978-1-4842-5431-8_2","url":null,"abstract":"","PeriodicalId":360785,"journal":{"name":"Zero Trust Networks with VMware NSX","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122026176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bird’s-Eye View of a Zero Trust Network","authors":"Sreejith Keeriyattil","doi":"10.1007/978-1-4842-5431-8_5","DOIUrl":"https://doi.org/10.1007/978-1-4842-5431-8_5","url":null,"abstract":"","PeriodicalId":360785,"journal":{"name":"Zero Trust Networks with VMware NSX","volume":"22 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}