000 02138nam a2200241Ia 4500
003 NULRC
005 20250520102910.0
008 250520s9999 xx 000 0 und d
020 _a9781491960387
040 _cNULRC
050 _aQA 76.9.A25 .B47 2017
100 _aBrotherston, Lee
_eauthor
245 0 _aDefensive security handbook :
_bbest practices for securing infrastructure /
_cLee Brotherston and Amanda Berlin
260 _aBeijing, China :
_bO'Reilly Media, Incorporated,
_cc2017
300 _aiii, 261 pages :
_billustrations ;
_c23 cm.
365 _bUSD26.32
504 _aIncludes index.
505 _aCreating a security program -- Asset management and documentation -- Policies -- Standards and procedures -- User education -- Incident response -- Disaster recovery -- Industry compliance standards and frameworks -- Physical security -- Microsoft Windows infrastructure -- Unix application servers -- Endpoints -- Password management and multifactor authentication -- Network infrastructure -- Segmentation -- Vulnerability management -- Development -- Purple teaming -- IDS and IPS -- Logging and monitoring -- The extra mile.
520 _aDespite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.
650 _aCOMPUTER NETWORKS -- SECURITY MEASURES
700 _aBerlin, Amanda
_eco-author
942 _2lcc
_cREF
999 _c18201
_d18201