Libros bestsellers hasta 50% dcto  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Defensive Security Handbook: Best Practices for Securing Infrastructure (in English)
Type
Physical Book
Publisher
Year
2017
Language
English
Pages
284
Format
Paperback
Dimensions
22.9 x 17.5 x 1.3 cm
Weight
0.41 kg.
ISBN13
9781491960387
Edition No.
1

Defensive Security Handbook: Best Practices for Securing Infrastructure (in English)

Lee Brotherston (Author) · Amanda Berlin (Author) · O'Reilly Media · Paperback

Defensive Security Handbook: Best Practices for Securing Infrastructure (in English) - Brotherston, Lee ; Berlin, Amanda

New Book

$ 34.99

$ 49.99

You save: $ 15.00

30% discount
  • Condition: New
It will be shipped from our warehouse between Monday, June 03 and Tuesday, June 04.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Defensive Security Handbook: Best Practices for Securing Infrastructure (in English)"

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews