Defensive security handbook: best practices for securing infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-1...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
[Place of publication not identified]
Ascent Audio
2024
|
Edition: | [First edition]. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781663735539/?ar |
Summary: | Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely. |
Physical Description: | 1 Online-Ressource (1 sound file (12 hr., 11 min.)) |
ISBN: | 9781663735539 1663735530 |
Staff View
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-111748984 | ||
003 | DE-627-1 | ||
005 | 20250109140336.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250109s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781663735539 |c electronic audio bk. |9 978-1-6637-3553-9 | ||
020 | |a 1663735530 |c electronic audio bk. |9 1-6637-3553-0 | ||
035 | |a (DE-627-1)111748984 | ||
035 | |a (DE-599)KEP111748984 | ||
035 | |a (ORHE)9781663735539 | ||
035 | |a (DE-627-1)111748984 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20241210 | |
100 | 1 | |a Berlin, Amanda |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Defensive security handbook |b best practices for securing infrastructure |c Amanda Berlin, Lee Brotherston, & William F. Reyor III |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Ascent Audio |c 2024 | |
300 | |a 1 Online-Ressource (1 sound file (12 hr., 11 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely. | ||
650 | 0 | |a Computer networks |x Security measures |z United States | |
650 | 0 | |a Computer security |x Planning |z United States | |
650 | 0 | |a Computer security |x Management |z United States | |
650 | 0 | |a Information technology |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis | |
650 | 4 | |a Sécurité informatique ; États-Unis ; Planification | |
650 | 4 | |a Sécurité informatique ; États-Unis ; Gestion | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
655 | 4 | |a Audiobooks | |
655 | 4 | |a Livres audio | |
700 | 1 | |a Brotherston, Lee |e VerfasserIn |4 aut | |
700 | 1 | |a Reyor, William F. |e VerfasserIn |4 aut | |
700 | 1 | |a Schnaubelt, Teri |e ErzählerIn |4 nrt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781663735539/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-111748984 |
---|---|
_version_ | 1829007829207351296 |
adam_text | |
any_adam_object | |
author | Berlin, Amanda Brotherston, Lee Reyor, William F. |
author2 | Schnaubelt, Teri |
author2_role | nrt |
author2_variant | t s ts |
author_facet | Berlin, Amanda Brotherston, Lee Reyor, William F. Schnaubelt, Teri |
author_role | aut aut aut |
author_sort | Berlin, Amanda |
author_variant | a b ab l b lb w f r wf wfr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)111748984 (DE-599)KEP111748984 (ORHE)9781663735539 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03332nam a22004932c 4500</leader><controlfield tag="001">ZDB-30-ORH-111748984</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20250109140336.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">250109s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663735539</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-6637-3553-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1663735530</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-6637-3553-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)111748984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP111748984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663735539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)111748984</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20241210</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Berlin, Amanda</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defensive security handbook</subfield><subfield code="b">best practices for securing infrastructure</subfield><subfield code="c">Amanda Berlin, Lee Brotherston, & William F. Reyor III</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 sound file (12 hr., 11 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Planning</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; États-Unis ; Planification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; États-Unis ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brotherston, Lee</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reyor, William F.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schnaubelt, Teri</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663735539/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
genre | Audiobooks Livres audio |
genre_facet | Audiobooks Livres audio |
id | ZDB-30-ORH-111748984 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:31Z |
institution | BVB |
isbn | 9781663735539 1663735530 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 sound file (12 hr., 11 min.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Ascent Audio |
record_format | marc |
spelling | Berlin, Amanda VerfasserIn aut Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, & William F. Reyor III [First edition]. [Place of publication not identified] Ascent Audio 2024 1 Online-Ressource (1 sound file (12 hr., 11 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely. Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures Audiobooks Livres audio Brotherston, Lee VerfasserIn aut Reyor, William F. VerfasserIn aut Schnaubelt, Teri ErzählerIn nrt |
spellingShingle | Berlin, Amanda Brotherston, Lee Reyor, William F. Defensive security handbook best practices for securing infrastructure Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures |
title | Defensive security handbook best practices for securing infrastructure |
title_auth | Defensive security handbook best practices for securing infrastructure |
title_exact_search | Defensive security handbook best practices for securing infrastructure |
title_full | Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, & William F. Reyor III |
title_fullStr | Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, & William F. Reyor III |
title_full_unstemmed | Defensive security handbook best practices for securing infrastructure Amanda Berlin, Lee Brotherston, & William F. Reyor III |
title_short | Defensive security handbook |
title_sort | defensive security handbook best practices for securing infrastructure |
title_sub | best practices for securing infrastructure |
topic | Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures |
topic_facet | Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures Audiobooks Livres audio |
work_keys_str_mv | AT berlinamanda defensivesecurityhandbookbestpracticesforsecuringinfrastructure AT brotherstonlee defensivesecurityhandbookbestpracticesforsecuringinfrastructure AT reyorwilliamf defensivesecurityhandbookbestpracticesforsecuringinfrastructure AT schnaubeltteri defensivesecurityhandbookbestpracticesforsecuringinfrastructure |