Defensive security handbook best practices for securing infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guid...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Brotherston, Lee (VerfasserIn), Berlin, Amanda (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol, CA O'Reilly Media 2017
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047617713
003 DE-627-1
005 20240228120247.0
007 cr uuu---uuuuu
008 191023s2017 xx |||||o 00| ||eng c
020 |a 9781491960356  |c electronic bk.  |9 978-1-4919-6035-6 
020 |a 1491960353  |c electronic bk.  |9 1-4919-6035-3 
020 |a 9781491960332  |c electronic bk.  |9 978-1-4919-6033-2 
020 |a 1491960337  |c electronic bk.  |9 1-4919-6033-7 
020 |a 9781491960370  |9 978-1-4919-6037-0 
020 |a 149196037X  |9 1-4919-6037-X 
020 |a 1491960388  |9 1-4919-6038-8 
020 |a 9781491960387  |9 978-1-4919-6038-7 
035 |a (DE-627-1)047617713 
035 |a (DE-599)KEP047617713 
035 |a (ORHE)9781491960370 
035 |a (DE-627-1)047617713 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.8  |2 23 
100 1 |a Brotherston, Lee  |e VerfasserIn  |4 aut 
245 1 0 |a Defensive security handbook  |b best practices for securing infrastructure  |c Lee Brotherston and Amanda Berlin 
264 1 |a Sebastopol, CA  |b O'Reilly Media  |c 2017 
300 |a 1 online resource (xx, 261 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Print version record 
520 |a Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. 
650 0 |a Computer networks  |x Security measures  |z United States 
650 0 |a Computer security  |x Planning  |z United States 
650 0 |a Computer security  |x Management  |z United States 
650 0 |a Information technology  |x Security measures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis 
650 4 |a Sécurité informatique ; États-Unis ; Planification 
650 4 |a Sécurité informatique ; États-Unis ; Gestion 
650 4 |a Technologie de l'information ; Sécurité ; Mesures 
650 4 |a COMPUTERS ; Security ; General 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security ; Management 
650 4 |a Information technology ; Security measures 
650 4 |a United States 
700 1 |a Berlin, Amanda  |e VerfasserIn  |4 aut 
776 1 |z 9781491960387 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781491960387 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781491960370/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047617713
_version_ 1818767306562469888
adam_text
any_adam_object
author Brotherston, Lee
Berlin, Amanda
author_facet Brotherston, Lee
Berlin, Amanda
author_role aut
aut
author_sort Brotherston, Lee
author_variant l b lb
a b ab
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047617713
(DE-599)KEP047617713
(ORHE)9781491960370
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03347cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-047617713</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120247.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960356</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-6035-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491960353</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-6035-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960332</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-6033-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491960337</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-6033-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960370</subfield><subfield code="9">978-1-4919-6037-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">149196037X</subfield><subfield code="9">1-4919-6037-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491960388</subfield><subfield code="9">1-4919-6038-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491960387</subfield><subfield code="9">978-1-4919-6038-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047617713</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047617713</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781491960370</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047617713</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brotherston, Lee</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defensive security handbook</subfield><subfield code="b">best practices for securing infrastructure</subfield><subfield code="c">Lee Brotherston and Amanda Berlin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 261 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Planning</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; États-Unis ; Planification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; États-Unis ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">United States</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Berlin, Amanda</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781491960387</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781491960387</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781491960370/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047617713
illustrated Illustrated
indexdate 2024-12-18T08:47:47Z
institution BVB
isbn 9781491960356
1491960353
9781491960332
1491960337
9781491960370
149196037X
1491960388
9781491960387
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (xx, 261 pages) illustrations
psigel ZDB-30-ORH
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher O'Reilly Media
record_format marc
spelling Brotherston, Lee VerfasserIn aut
Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin
Sebastopol, CA O'Reilly Media 2017
1 online resource (xx, 261 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Print version record
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.
Computer networks Security measures United States
Computer security Planning United States
Computer security Management United States
Information technology Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis
Sécurité informatique ; États-Unis ; Planification
Sécurité informatique ; États-Unis ; Gestion
Technologie de l'information ; Sécurité ; Mesures
COMPUTERS ; Security ; General
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
United States
Berlin, Amanda VerfasserIn aut
9781491960387
Erscheint auch als Druck-Ausgabe 9781491960387
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781491960370/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Brotherston, Lee
Berlin, Amanda
Defensive security handbook best practices for securing infrastructure
Computer networks Security measures United States
Computer security Planning United States
Computer security Management United States
Information technology Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis
Sécurité informatique ; États-Unis ; Planification
Sécurité informatique ; États-Unis ; Gestion
Technologie de l'information ; Sécurité ; Mesures
COMPUTERS ; Security ; General
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
United States
title Defensive security handbook best practices for securing infrastructure
title_auth Defensive security handbook best practices for securing infrastructure
title_exact_search Defensive security handbook best practices for securing infrastructure
title_full Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin
title_fullStr Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin
title_full_unstemmed Defensive security handbook best practices for securing infrastructure Lee Brotherston and Amanda Berlin
title_short Defensive security handbook
title_sort defensive security handbook best practices for securing infrastructure
title_sub best practices for securing infrastructure
topic Computer networks Security measures United States
Computer security Planning United States
Computer security Management United States
Information technology Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis
Sécurité informatique ; États-Unis ; Planification
Sécurité informatique ; États-Unis ; Gestion
Technologie de l'information ; Sécurité ; Mesures
COMPUTERS ; Security ; General
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
United States
topic_facet Computer networks Security measures United States
Computer security Planning United States
Computer security Management United States
Information technology Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures ; États-Unis
Sécurité informatique ; États-Unis ; Planification
Sécurité informatique ; États-Unis ; Gestion
Technologie de l'information ; Sécurité ; Mesures
COMPUTERS ; Security ; General
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
United States
url https://learning.oreilly.com/library/view/-/9781491960370/?ar
work_keys_str_mv AT brotherstonlee defensivesecurityhandbookbestpracticesforsecuringinfrastructure
AT berlinamanda defensivesecurityhandbookbestpracticesforsecuringinfrastructure