Cargando…

Defensive security handbook : best practices for securing infrastructure /

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guid...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Brotherston, Lee (Autor), Berlin, Amanda (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2017.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn981765043
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 170406s2017 caua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDX  |d EBLCP  |d N$T  |d TEFOD  |d UMI  |d TOH  |d IDEBK  |d OCLCQ  |d UPM  |d OCLCA  |d VT2  |d MNW  |d HCO  |d OCLCF  |d OCLCO  |d UOK  |d WAU  |d COO  |d CEF  |d KSU  |d DEBBG  |d MERER  |d WYU  |d OCLCQ  |d C6I  |d UAB  |d AU@  |d UKAHL  |d OCLCQ  |d OCLCO  |d NZAUC  |d OCLCQ 
019 |a 981955802  |a 983204724  |a 987023584 
020 |a 9781491960356  |q (electronic bk.) 
020 |a 1491960353  |q (electronic bk.) 
020 |a 9781491960332  |q (electronic bk.) 
020 |a 1491960337  |q (electronic bk.) 
020 |a 9781491960370 
020 |a 149196037X 
020 |a 1491960388 
020 |a 9781491960387 
020 |z 9781491960387 
029 1 |a AU@  |b 000060698868 
029 1 |a AU@  |b 000066231090 
029 1 |a GBVCP  |b 1004860609 
035 |a (OCoLC)981765043  |z (OCoLC)981955802  |z (OCoLC)983204724  |z (OCoLC)987023584 
037 |a 46F05EE5-C61B-4E36-A850-08CD7FB26DC3  |b OverDrive, Inc.  |n http://www.overdrive.com 
043 |a n-us--- 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Brotherston, Lee,  |e author. 
245 1 0 |a Defensive security handbook :  |b best practices for securing infrastructure /  |c Lee Brotherston and Amanda Berlin. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2017. 
300 |a 1 online resource (xx, 261 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Creating a security program -- Asset management and documentation -- Policies -- Standards and procedures -- User education -- Incident response -- Disaster recovery -- Industry compliance standards and frameworks -- Physical security -- Microsoft Windows infrastructure -- Unix application servers -- Endpoints -- Password management and multifactor authentication -- Network infrastructure -- Segmentation -- Vulnerability management -- Development -- Purple teaming -- IDS and IPS -- Logging and monitoring -- The extra mile. 
520 |a Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures  |z United States. 
650 0 |a Computer security  |z United States  |x Planning. 
650 0 |a Computer security  |z United States  |x Management. 
650 0 |a Information technology  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |z États-Unis. 
650 6 |a Sécurité informatique  |z États-Unis  |x Planification. 
650 6 |a Sécurité informatique  |z États-Unis  |x Gestion. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
700 1 |a Berlin, Amanda,  |e author. 
776 0 8 |i Print version:  |a Brotherston, Lee.  |t Defensive security handbook.  |b First edition.  |d Sebastopol, CA : O'Reilly Media, Inc., 2017  |z 9781491960387  |w (OCoLC)974194916 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491960370/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32686500 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32657370 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4835430 
938 |a EBSCOhost  |b EBSC  |n 1498009 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis37939774 
938 |a YBP Library Services  |b YANK  |n 13956403 
994 |a 92  |b IZTAP