Cybersecurity for small networks: a no-nonsense guide for the reasonably paranoid
This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network arc...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco, CA
No Starch Press, Inc.
[2022]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781098156633/?ar |
Zusammenfassung: | This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available. |
Beschreibung: | Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed |
Umfang: | 1 Online-Ressource |
ISBN: | 9781718501492 1718501498 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-082177880 | ||
003 | DE-627-1 | ||
005 | 20240228121731.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221012s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781718501492 |c ebook |9 978-1-7185-0149-2 | ||
020 | |a 1718501498 |9 1-7185-0149-8 | ||
035 | |a (DE-627-1)082177880 | ||
035 | |a (DE-599)KEP082177880 | ||
035 | |a (ORHE)9781098156633 | ||
035 | |a (DE-627-1)082177880 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.6/8 |2 23/eng/20220707 | |
100 | 1 | |a Enoka, Seth |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity for small networks |b a no-nonsense guide for the reasonably paranoid |c by Seth Enoka |
264 | 1 | |a San Francisco, CA |b No Starch Press, Inc. |c [2022] | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed | ||
520 | |a This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available. | ||
650 | 0 | |a Local area networks (Computer networks) |x Security measures | |
650 | 4 | |a Réseaux locaux (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Local area networks (Computer networks) ; Security measures | |
776 | 1 | |z 9781718501485 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781718501485 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098156633/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-082177880 |
---|---|
_version_ | 1821494819311058944 |
adam_text | |
any_adam_object | |
author | Enoka, Seth |
author_facet | Enoka, Seth |
author_role | aut |
author_sort | Enoka, Seth |
author_variant | s e se |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)082177880 (DE-599)KEP082177880 (ORHE)9781098156633 |
dewey-full | 004.6/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6/8 |
dewey-search | 004.6/8 |
dewey-sort | 14.6 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02656cam a22004092 4500</leader><controlfield tag="001">ZDB-30-ORH-082177880</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121731.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221012s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781718501492</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-7185-0149-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1718501498</subfield><subfield code="9">1-7185-0149-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082177880</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP082177880</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098156633</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082177880</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6/8</subfield><subfield code="2">23/eng/20220707</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Enoka, Seth</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity for small networks</subfield><subfield code="b">a no-nonsense guide for the reasonably paranoid</subfield><subfield code="c">by Seth Enoka</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, CA</subfield><subfield code="b">No Starch Press, Inc.</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Local area networks (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux locaux (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Local area networks (Computer networks) ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781718501485</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781718501485</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098156633/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-082177880 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:26Z |
institution | BVB |
isbn | 9781718501492 1718501498 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | No Starch Press, Inc. |
record_format | marc |
spelling | Enoka, Seth VerfasserIn aut Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid by Seth Enoka San Francisco, CA No Starch Press, Inc. [2022] 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available. Local area networks (Computer networks) Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Local area networks (Computer networks) ; Security measures 9781718501485 Erscheint auch als Druck-Ausgabe 9781718501485 |
spellingShingle | Enoka, Seth Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid Local area networks (Computer networks) Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Local area networks (Computer networks) ; Security measures |
title | Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid |
title_auth | Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid |
title_exact_search | Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid |
title_full | Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid by Seth Enoka |
title_fullStr | Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid by Seth Enoka |
title_full_unstemmed | Cybersecurity for small networks a no-nonsense guide for the reasonably paranoid by Seth Enoka |
title_short | Cybersecurity for small networks |
title_sort | cybersecurity for small networks a no nonsense guide for the reasonably paranoid |
title_sub | a no-nonsense guide for the reasonably paranoid |
topic | Local area networks (Computer networks) Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Local area networks (Computer networks) ; Security measures |
topic_facet | Local area networks (Computer networks) Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Local area networks (Computer networks) ; Security measures |
work_keys_str_mv | AT enokaseth cybersecurityforsmallnetworksanononsenseguideforthereasonablyparanoid |