skip to content
Defensive security handbook : best practices for securing infrastructure Preview this item
ClosePreview this item
Checking...

Defensive security handbook : best practices for securing infrastructure

Author: Lee Brotherston; Amanda Berlin
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
La 4e de couverture indique : "Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Lee Brotherston; Amanda Berlin
ISBN: 9781491960387 1491960388
OCLC Number: 1003641403
Description: 1 vol. (xx-261 p.) : ill. ; 24 cm.
Contents: Creating a security program --
Asset management and documentation --
Policies --
Standards and procedures --
User education --
Incident response --
Disaster recovery --
Industry compliance standards and frameworks --
Physical security --
Microsoft Windows infrastructure --
Unix application servers --
Endpoints --
Password management and multifactor authentication --
Network infrastructure --
Segmentation --
Vulnerability management --
Development --
Purple teaming --
IDS and IPS --
Logging and monitoring --
The extra mile
Responsibility: Lee Brotherston and Amanda Berlin.

Abstract:

This pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1003641403> # Defensive security handbook : best practices for securing infrastructure
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "1003641403" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/xxu> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/4134932947#Topic/reseaux_d_ordinateurs_mesures_de_surete> ; # Réseaux d'ordinateurs--Mesures de sûreté
   schema:about <http://experiment.worldcat.org/entity/work/data/4134932947#Topic/systemes_informatiques_mesures_de_surete> ; # Systèmes informatiques--Mesures de sûreté
   schema:about <http://experiment.worldcat.org/entity/work/data/4134932947#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/4134932947#Topic/computer_security_management> ; # Computer security--Management
   schema:about <http://experiment.worldcat.org/entity/work/data/4134932947#Topic/information_technology_security_measures> ; # Information technology--Security measures
   schema:author <http://experiment.worldcat.org/entity/work/data/4134932947#Person/berlin_amanda_19> ; # Amanda Berlin
   schema:author <http://experiment.worldcat.org/entity/work/data/4134932947#Person/brotherston_lee> ; # Lee Brotherston
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2017" ;
   schema:datePublished "2017" ;
   schema:description "Creating a security program -- Asset management and documentation -- Policies -- Standards and procedures -- User education -- Incident response -- Disaster recovery -- Industry compliance standards and frameworks -- Physical security -- Microsoft Windows infrastructure -- Unix application servers -- Endpoints -- Password management and multifactor authentication -- Network infrastructure -- Segmentation -- Vulnerability management -- Development -- Purple teaming -- IDS and IPS -- Logging and monitoring -- The extra mile" ;
   schema:description "La 4e de couverture indique : "Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks"" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/4134932947> ;
   schema:inLanguage "en" ;
   schema:name "Defensive security handbook : best practices for securing infrastructure" ;
   schema:productID "1003641403" ;
   schema:workExample <http://worldcat.org/isbn/9781491960387> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/1003641403> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4134932947#Person/berlin_amanda_19> # Amanda Berlin
    a schema:Person ;
   schema:birthDate "19.." ;
   schema:deathDate "" ;
   schema:familyName "Berlin" ;
   schema:givenName "Amanda" ;
   schema:name "Amanda Berlin" ;
    .

<http://experiment.worldcat.org/entity/work/data/4134932947#Person/brotherston_lee> # Lee Brotherston
    a schema:Person ;
   schema:familyName "Brotherston" ;
   schema:givenName "Lee" ;
   schema:name "Lee Brotherston" ;
    .

<http://experiment.worldcat.org/entity/work/data/4134932947#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures" ;
    .

<http://experiment.worldcat.org/entity/work/data/4134932947#Topic/computer_security_management> # Computer security--Management
    a schema:Intangible ;
   schema:name "Computer security--Management" ;
    .

<http://experiment.worldcat.org/entity/work/data/4134932947#Topic/information_technology_security_measures> # Information technology--Security measures
    a schema:Intangible ;
   schema:name "Information technology--Security measures" ;
    .

<http://experiment.worldcat.org/entity/work/data/4134932947#Topic/reseaux_d_ordinateurs_mesures_de_surete> # Réseaux d'ordinateurs--Mesures de sûreté
    a schema:Intangible ;
   schema:name "Réseaux d'ordinateurs--Mesures de sûreté" ;
    .

<http://experiment.worldcat.org/entity/work/data/4134932947#Topic/systemes_informatiques_mesures_de_surete> # Systèmes informatiques--Mesures de sûreté
    a schema:Intangible ;
   schema:name "Systèmes informatiques--Mesures de sûreté" ;
    .

<http://worldcat.org/isbn/9781491960387>
    a schema:ProductModel ;
   schema:description "br" ;
   schema:isbn "1491960388" ;
   schema:isbn "9781491960387" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.