Defensive security handbook : best practices for securing infrastructure /
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guid...
Call Number: | Libro Electrónico |
---|---|
Main Authors: | , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Sebastopol, CA :
O'Reilly Media,
2017.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Creating a security program
- Asset management and documentation
- Policies
- Standards and procedures
- User education
- Incident response
- Disaster recovery
- Industry compliance standards and frameworks
- Physical security
- Microsoft Windows infrastructure
- Unix application servers
- Endpoints
- Password management and multifactor authentication
- Network infrastructure
- Segmentation
- Vulnerability management
- Development
- Purple teaming
- IDS and IPS
- Logging and monitoring
- The extra mile.