Lyssna när som helst, var som helst

Kliv in i en oändlig värld av stories

  • 1 miljon stories
  • Hundratals nya stories varje vecka
  • Få tillgång till exklusivt innehåll
  • Avsluta när du vill
Starta erbjudandet
SE - Details page - Device banner - 894x1036

Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition)

Längd
12T 11min
Språk
Engelska
Format
Kategori

Fakta

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.

This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely.

© 2024 Ascent Audio (Ljudbok): 9781663735522

Utgivningsdatum

Ljudbok: 26 november 2024

Andra gillade också ...

  1. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  2. Cybersecutity First Principles Rick Howard
  3. Practical Cloud Security: A Guide for Secure Design and Deployment (2nd Edition) Chris Dotson
  4. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  5. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  6. The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Steve Wilson
  7. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
  8. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  9. Cybersecurity For Dummies Joseph Steinberg
  10. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  11. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
  12. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  13. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
  14. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  15. Network Security For Beginners: Strategies, Tactics, and Ethical Boundaries for Mastering Social Engineering Daniel Green
  16. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  17. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  18. Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security Chuck Brooks
  19. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  20. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  21. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  22. Hacking API: Navigating the Intricacies of API Security and Ethical Hacking James Ferry
  23. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  24. Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) Benjamin Walker
  25. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  26. Code Dependent: How AI Is Changing Our Lives — Shortlisted for the Women's Prize for Non-Fiction Madhumita Murgia
  27. Alice and Bob Learn Application Security Tanya Janca
  28. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  29. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  30. Hackable: How to Do Application Security Right Ted Harrington
  31. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
  32. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  33. Data Science John D. Kelleher
  34. 97 Principles for Software Architects: Axioms for software architecture and development written by industry practitioners Multiple Authors
  35. Building Microservices: Designing Fine-Grained Systems Sam Newman
  36. Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures Neal Ford
  37. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
  38. AI and Machine Learning for On-Device Development: A Programmer's Guide, 1st Edition Laurence Moroney
  39. Monolith to Microservices: Evolutionary Patterns to Transform Your Monolith Sam Newman
  40. Effective Machine Learning Teams: Best Practices for ML Practitioners David Colls
  41. Google Cloud Cookbook: Practical Solutions for Building and Deploying Cloud Services, 1st Edition Rui Costa
  42. Terraform: Up and Running: Writing Infrastructure as Code, 3rd Edition Yevgeniy Brikman
  43. Computational Thinking Peter J. Denning

Därför kommer du älska Storytel:

  • 1 miljon stories

  • Lyssna och läs offline

  • Exklusiva nyheter varje vecka

  • Kids Mode (barnsäker miljö)

Populäraste valet

Premium

Lyssna och läs ofta.

169 kr /månad
  • 1 konto

  • 100 timmar/månad

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

Starta erbjudandet

Unlimited

Lyssna och läs obegränsat.

229 kr /månad
  • 1 konto

  • Lyssna obegränsat

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

Starta erbjudandet

Family

Dela stories med hela familjen.

Från 239 kr/månad
  • 2-6 konton

  • 100 timmar/månad för varje konto

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

2 konton

239 kr /månad
Starta erbjudandet

Flex

Lyssna och läs ibland – spara dina olyssnade timmar.

99 kr /månad
  • 1 konto

  • 20 timmar/månad

  • Spara upp till 100 olyssnade timmar

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

Starta erbjudandet