Defensive security handbook best practices for securing infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guid...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
2017
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047617713 | ||
003 | DE-627-1 | ||
005 | 20240228120247.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9781491960356 |c electronic bk. |9 978-1-4919-6035-6 | ||
020 | |a 1491960353 |c electronic bk. |9 1-4919-6035-3 | ||
020 | |a 9781491960332 |c electronic bk. |9 978-1-4919-6033-2 | ||
020 | |a 1491960337 |c electronic bk. |9 1-4919-6033-7 | ||
020 | |a 9781491960370 |9 978-1-4919-6037-0 | ||
020 | |a 149196037X |9 1-4919-6037-X | ||
020 | |a 1491960388 |9 1-4919-6038-8 | ||
020 | |a 9781491960387 |9 978-1-4919-6038-7 | ||
035 | |a (DE-627-1)047617713 | ||
035 | |a (DE-599)KEP047617713 | ||
035 | |a (ORHE)9781491960370 | ||
035 | |a (DE-627-1)047617713 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Brotherston, Lee |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Defensive security handbook |b best practices for securing infrastructure |c Lee Brotherston and Amanda Berlin |
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c 2017 | |
300 | |a 1 online resource (xx, 261 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. | ||
650 | 0 | |a Computer networks |x Security measures |z United States | |
650 | 0 | |a Computer security |x Planning |z United States | |
650 | 0 | |a Computer security |x Management |z United States | |
650 | 0 | |a Information technology |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis | |
650 | 4 | |a Sécurité informatique ; États-Unis ; Planification | |
650 | 4 | |a Sécurité informatique ; États-Unis ; Gestion | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Information technology ; Security measures | |
650 | 4 | |a United States | |
700 | 1 | |a Berlin, Amanda |e VerfasserIn |4 aut | |
776 | 1 | |z 9781491960387 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781491960387 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781491960370/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047617713 |
---|---|
_version_ | 1818767306562469888 |
adam_text | |
any_adam_object | |
author | Brotherston, Lee Berlin, Amanda |
author_facet | Brotherston, Lee Berlin, Amanda |
author_role | aut aut |
author_sort | Brotherston, Lee |
author_variant | l b lb a b ab |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047617713 (DE-599)KEP047617713 (ORHE)9781491960370 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03347cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-047617713</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120247.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960356</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-6035-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491960353</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-6035-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960332</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-6033-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491960337</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-6033-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960370</subfield><subfield code="9">978-1-4919-6037-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">149196037X</subfield><subfield code="9">1-4919-6037-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491960388</subfield><subfield code="9">1-4919-6038-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960387</subfield><subfield code="9">978-1-4919-6038-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047617713</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047617713</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781491960370</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047617713</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brotherston, Lee</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defensive security handbook</subfield><subfield code="b">best practices for securing infrastructure</subfield><subfield code="c">Lee Brotherston and Amanda Berlin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 261 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Planning</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; États-Unis ; Planification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; États-Unis ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">United States</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Berlin, Amanda</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781491960387</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781491960387</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781491960370/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047617713 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:47Z |
institution | BVB |
isbn | 9781491960356 1491960353 9781491960332 1491960337 9781491960370 149196037X 1491960388 9781491960387 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xx, 261 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Brotherston, Lee VerfasserIn aut Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin Sebastopol, CA O'Reilly Media 2017 1 online resource (xx, 261 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Information technology ; Security measures United States Berlin, Amanda VerfasserIn aut 9781491960387 Erscheint auch als Druck-Ausgabe 9781491960387 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781491960370/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Brotherston, Lee Berlin, Amanda Defensive security handbook best practices for securing infrastructure Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Information technology ; Security measures United States |
title | Defensive security handbook best practices for securing infrastructure |
title_auth | Defensive security handbook best practices for securing infrastructure |
title_exact_search | Defensive security handbook best practices for securing infrastructure |
title_full | Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin |
title_fullStr | Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin |
title_full_unstemmed | Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin |
title_short | Defensive security handbook |
title_sort | defensive security handbook best practices for securing infrastructure |
title_sub | best practices for securing infrastructure |
topic | Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Information technology ; Security measures United States |
topic_facet | Computer networks Security measures United States Computer security Planning United States Computer security Management United States Information technology Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis Sécurité informatique ; États-Unis ; Planification Sécurité informatique ; États-Unis ; Gestion Technologie de l'information ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Information technology ; Security measures United States |
url | https://learning.oreilly.com/library/view/-/9781491960370/?ar |
work_keys_str_mv | AT brotherstonlee defensivesecurityhandbookbestpracticesforsecuringinfrastructure AT berlinamanda defensivesecurityhandbookbestpracticesforsecuringinfrastructure |