000 01874nam a22003137a 4500
005 20260105112057.0
008 260105b2024 un a|||| |||| 00| 0 eng d
020 _a9781098127244
040 _aAUE
_cAUE
_erda
041 _aeng
050 _aQA76.9
_b .A25 B4833 2024
100 1 _aBerlin, Amanda
245 1 0 _aDefensive security handbook :
_bbest practices for securing infrastructure /
_cAmanda Berlin, Lee Brotherston, and William F. Reyor III.
250 _aSecond edition.
264 1 _aSebastopol :
_bO'Reilly Media,
_c2024.
300 _a334 pages.
_billustrations,
_c24 cm.
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
504 _a Includes index.
520 _a Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.
650 0 _2Computer networks
_xSecurity measures
_zUnited States.
650 0 _2Computer security
_xPlanning
_zUnited States
650 0 _2Computer security
_xManagement
_zUnited States
700 1 _aBrotherston, Lee
_eauthor
700 1 _aReyor, William
_eauthor
942 _2lcc
_cBK
_n0
999 _c30332
_d30332