|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_on1345589445 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
220924s2022 cau o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d ORMDA
|d GW5XE
|d YDX
|d EBLCP
|d OCLCF
|d OCLCQ
|d TOH
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1345580004
|
020 |
|
|
|a 9781484286289
|q (electronic bk.)
|
020 |
|
|
|a 1484286286
|q (electronic bk.)
|
020 |
|
|
|z 1484286278
|
020 |
|
|
|z 9781484286272
|
024 |
7 |
|
|a 10.1007/978-1-4842-8628-9
|2 doi
|
029 |
1 |
|
|a AU@
|b 000072790609
|
035 |
|
|
|a (OCoLC)1345589445
|z (OCoLC)1345580004
|
037 |
|
|
|a 9781484286289
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 658.4/78
|2 23/eng/20220928
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cherry, Denny.
|
245 |
1 |
0 |
|a Enterprise-Grade IT Security for Small and Medium Businesses
|h [electronic resource] :
|b Building Security Systems, in Plain English /
|c Denny Cherry.
|
260 |
|
|
|a Berkeley, CA :
|b Apress L. P.,
|c 2022.
|
300 |
|
|
|a 1 online resource (153 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
520 |
|
|
|a Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.
|
505 |
0 |
|
|a Introduction -- Part I. The Infrastructure -- 1. Why IT Security Matters -- 2. Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. Remote Connectivity -- -- Part II. The Computers -- 6. Operating System Security -- 7. Multi-Factor Authentication -- 8. Zero Trust Environments -- Part III. The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Small business
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
655 |
|
0 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Cherry, Denny
|t Enterprise-Grade IT Security for Small and Medium Businesses
|d Berkeley, CA : Apress L. P.,c2022
|z 9781484286272
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484286289/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL7097847
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18127777
|
994 |
|
|
|a 92
|b IZTAP
|