Слушайте и четете неограничено

Открийте безкрайна вселена от истории

  • Слушайте и четете неограничено
  • Над 500 000 заглавия
  • Ексклузивни и Storytel Original заглавия
  • Можете да прекратите лесно по всяко време
Пробвайте Storytel
BG - Details page - Device banner - 894x1036

Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition)

Дължина
12ч. 11мин.
Език
Английски
Format
Категория

Документални

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.

This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely.

© 2024 Ascent Audio (Аудиокнига): 9781663735522

Дата на публикуване

Аудиокнига: 26 ноември 2024 г.

Разгледай още от

    Другите харесаха също...

    1. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    2. Cybersecutity First Principles Rick Howard
    3. Practical Cloud Security: A Guide for Secure Design and Deployment (2nd Edition) Chris Dotson
    4. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    5. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    6. The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Steve Wilson
    7. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
    8. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    9. Cybersecurity For Dummies Joseph Steinberg
    10. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    11. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    12. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    13. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    14. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    15. Network Security For Beginners: Strategies, Tactics, and Ethical Boundaries for Mastering Social Engineering Daniel Green
    16. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    17. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
    18. Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security Chuck Brooks
    19. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    20. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    21. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    22. Hacking API: Navigating the Intricacies of API Security and Ethical Hacking James Ferry
    23. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    24. Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) Benjamin Walker
    25. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    26. Code Dependent: How AI Is Changing Our Lives — Shortlisted for the Women's Prize for Non-Fiction Madhumita Murgia
    27. Alice and Bob Learn Application Security Tanya Janca
    28. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    29. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    30. Hackable: How to Do Application Security Right Ted Harrington
    31. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
    32. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    33. Data Science John D. Kelleher
    34. 97 Principles for Software Architects: Axioms for software architecture and development written by industry practitioners Multiple Authors
    35. Building Microservices: Designing Fine-Grained Systems Sam Newman
    36. Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures Neal Ford
    37. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
    38. AI and Machine Learning for On-Device Development: A Programmer's Guide, 1st Edition Laurence Moroney
    39. Monolith to Microservices: Evolutionary Patterns to Transform Your Monolith Sam Newman
    40. Effective Machine Learning Teams: Best Practices for ML Practitioners David Colls
    41. Google Cloud Cookbook: Practical Solutions for Building and Deploying Cloud Services, 1st Edition Rui Costa
    42. Terraform: Up and Running: Writing Infrastructure as Code, 3rd Edition Yevgeniy Brikman
    43. Computational Thinking Peter J. Denning

    Избери своя абонамент:

    • Над 500 000 заглавия

    • Сваляте книги за офлайн слушане

    • Ексклузивни заглавия + Storytel Original

    • Детски режим (безопасна зона за деца)

    • Лесно прекратявате по всяко време

    Най-популярен

    Unlimited

    Най-добрият избор. Открийте хиляди незабравими истории.

    7.66 € | 14.99 лв. /месец
    • 1 профил

    • Неограничен достъп

    • Избирайте от хиляди заглавия

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте сега

    Unlimited Годишен

    Спестете 33%! Избирайте от хиляди заглавия.

    61.35 € | 119.99 лв. /година
    7 дни безплатно
    12 месеца на цената на 8
    • 1 профил

    • Неограничен достъп

    • 5.11 € | 9.99 лв. на месец

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте 7 дни безплатно

    Family (2 акаунта)

    Споделете историите със семейството или приятелите си.

    11.24 € | 21.99 лв. /30 дни
    • 2 профила

    • Неограничен достъп

    • Потопете се заедно в света на историите

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте 7 дни безплатно

    Family (3 акаунта)

    Споделете историите със семейството или приятелите си.

    13.29 € | 25.99 лв. /30 дни
    • 3 профила

    • Неограничен достъп

    • Потопете се заедно в света на историите

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте 7 дни безплатно