Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make r...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Berkeley, CA
Apress L. P.
2022
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781484286289/?ar |
Summary: | Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. |
Item Description: | Description based upon print version of record |
Physical Description: | 1 Online-Ressource (153 Seiten) |
ISBN: | 9781484286289 1484286286 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-082534055 | ||
003 | DE-627-1 | ||
005 | 20240228121806.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221111s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781484286289 |c electronic bk. |9 978-1-4842-8628-9 | ||
020 | |a 1484286286 |c electronic bk. |9 1-4842-8628-6 | ||
035 | |a (DE-627-1)082534055 | ||
035 | |a (DE-599)KEP082534055 | ||
035 | |a (ORHE)9781484286289 | ||
035 | |a (DE-627-1)082534055 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 658.4/78 |2 23/eng/20220928 | |
100 | 1 | |a Cherry, Denny |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Enterprise-Grade IT Security for Small and Medium Businesses |b Building Security Systems, in Plain English |c Denny Cherry |
264 | 1 | |a Berkeley, CA |b Apress L. P. |c 2022 | |
300 | |a 1 Online-Ressource (153 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record | ||
520 | |a Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. | ||
650 | 0 | |a Small business |x Computer networks |x Security measures | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
776 | 1 | |z 9781484286272 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484286272 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484286289/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-082534055 |
---|---|
_version_ | 1829007732646084608 |
adam_text | |
any_adam_object | |
author | Cherry, Denny |
author_facet | Cherry, Denny |
author_role | aut |
author_sort | Cherry, Denny |
author_variant | d c dc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)082534055 (DE-599)KEP082534055 (ORHE)9781484286289 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02786cam a22004452c 4500</leader><controlfield tag="001">ZDB-30-ORH-082534055</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121806.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221111s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484286289</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-8628-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484286286</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-8628-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082534055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP082534055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484286289</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082534055</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23/eng/20220928</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cherry, Denny</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise-Grade IT Security for Small and Medium Businesses</subfield><subfield code="b">Building Security Systems, in Plain English</subfield><subfield code="c">Denny Cherry</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress L. P.</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (153 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Small business</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484286272</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484286272</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484286289/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-082534055 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:34:59Z |
institution | BVB |
isbn | 9781484286289 1484286286 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (153 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Apress L. P. |
record_format | marc |
spelling | Cherry, Denny VerfasserIn aut Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English Denny Cherry Berkeley, CA Apress L. P. 2022 1 Online-Ressource (153 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based upon print version of record Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. Small business Computer networks Security measures Business enterprises Computer networks Security measures Business enterprises ; Computer networks ; Security measures 9781484286272 Erscheint auch als Druck-Ausgabe 9781484286272 |
spellingShingle | Cherry, Denny Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English Small business Computer networks Security measures Business enterprises Computer networks Security measures Business enterprises ; Computer networks ; Security measures |
title | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English |
title_auth | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English |
title_exact_search | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English |
title_full | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English Denny Cherry |
title_fullStr | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English Denny Cherry |
title_full_unstemmed | Enterprise-Grade IT Security for Small and Medium Businesses Building Security Systems, in Plain English Denny Cherry |
title_short | Enterprise-Grade IT Security for Small and Medium Businesses |
title_sort | enterprise grade it security for small and medium businesses building security systems in plain english |
title_sub | Building Security Systems, in Plain English |
topic | Small business Computer networks Security measures Business enterprises Computer networks Security measures Business enterprises ; Computer networks ; Security measures |
topic_facet | Small business Computer networks Security measures Business enterprises Computer networks Security measures Business enterprises ; Computer networks ; Security measures |
work_keys_str_mv | AT cherrydenny enterprisegradeitsecurityforsmallandmediumbusinessesbuildingsecuritysystemsinplainenglish |