Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Enterprise-Grade IT Security for Small and Medium Businesses/ by Denny Cherry.
Reminder of title:
Building Security Systems, in Plain English /
Author:
Cherry, Denny.
Description:
XII, 153 p. 55 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-1-4842-8628-9
ISBN:
9781484286289
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
Cherry, Denny.
Enterprise-Grade IT Security for Small and Medium Businesses
Building Security Systems, in Plain English /[electronic resource] :by Denny Cherry. - 1st ed. 2022. - XII, 153 p. 55 illus.online resource.
Introduction -- Part I. The Infrastructure -- 1. Why IT Security Matters -- 2. Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. Remote Connectivity -- -- Part II. The Computers -- 6. Operating System Security -- 7. Multi-Factor Authentication -- 8. Zero Trust Environments -- Part III. The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training.
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
ISBN: 9781484286289
Standard No.: 10.1007/978-1-4842-8628-9doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
LDR
:03422nam a22004095i 4500
001
1083211
003
DE-He213
005
20220916115046.0
007
cr nn 008mamaa
008
221228s2022 xxu| s |||| 0|eng d
020
$a
9781484286289
$9
978-1-4842-8628-9
024
7
$a
10.1007/978-1-4842-8628-9
$2
doi
035
$a
978-1-4842-8628-9
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Cherry, Denny.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
908103
245
1 0
$a
Enterprise-Grade IT Security for Small and Medium Businesses
$h
[electronic resource] :
$b
Building Security Systems, in Plain English /
$c
by Denny Cherry.
250
$a
1st ed. 2022.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
XII, 153 p. 55 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Part I. The Infrastructure -- 1. Why IT Security Matters -- 2. Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. Remote Connectivity -- -- Part II. The Computers -- 6. Operating System Security -- 7. Multi-Factor Authentication -- 8. Zero Trust Environments -- Part III. The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training.
520
$a
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer networks—Security measures.
$3
1366173
650
0
$a
Risk management.
$3
559158
650
0
$a
Computer security.
$3
557122
650
0
$a
Information technology—Management.
$3
1365950
650
0
$a
Microsoft software.
$3
1253736
650
0
$a
Microsoft .NET Framework.
$3
565417
650
1 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
IT Risk Management.
$3
1366666
650
2 4
$a
Principles and Models of Security.
$3
1225876
650
2 4
$a
Business IT Infrastructure.
$3
1070169
650
2 4
$a
Microsoft.
$3
1387749
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484286272
776
0 8
$i
Printed edition:
$z
9781484286296
856
4 0
$u
https://doi.org/10.1007/978-1-4842-8628-9
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login