語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Enterprise-Grade IT Security for Small and Medium Businesses/ by Denny Cherry.
其他題名:
Building Security Systems, in Plain English /
作者:
Cherry, Denny.
面頁冊數:
XII, 153 p. 55 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Microsoft. -
電子資源:
https://doi.org/10.1007/978-1-4842-8628-9
ISBN:
9781484286289
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
Cherry, Denny.
Enterprise-Grade IT Security for Small and Medium Businesses
Building Security Systems, in Plain English /[electronic resource] :by Denny Cherry. - 1st ed. 2022. - XII, 153 p. 55 illus.online resource.
Introduction -- Part I. The Infrastructure -- 1. Why IT Security Matters -- 2. Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. Remote Connectivity -- -- Part II. The Computers -- 6. Operating System Security -- 7. Multi-Factor Authentication -- 8. Zero Trust Environments -- Part III. The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training.
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
ISBN: 9781484286289
Standard No.: 10.1007/978-1-4842-8628-9doiSubjects--Topical Terms:
1387749
Microsoft.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Enterprise-Grade IT Security for Small and Medium Businesses = Building Security Systems, in Plain English /
LDR
:03422nam a22004095i 4500
001
1083211
003
DE-He213
005
20220916115046.0
007
cr nn 008mamaa
008
221228s2022 xxu| s |||| 0|eng d
020
$a
9781484286289
$9
978-1-4842-8628-9
024
7
$a
10.1007/978-1-4842-8628-9
$2
doi
035
$a
978-1-4842-8628-9
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Cherry, Denny.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
908103
245
1 0
$a
Enterprise-Grade IT Security for Small and Medium Businesses
$h
[electronic resource] :
$b
Building Security Systems, in Plain English /
$c
by Denny Cherry.
250
$a
1st ed. 2022.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
XII, 153 p. 55 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Part I. The Infrastructure -- 1. Why IT Security Matters -- 2. Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. Remote Connectivity -- -- Part II. The Computers -- 6. Operating System Security -- 7. Multi-Factor Authentication -- 8. Zero Trust Environments -- Part III. The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training.
520
$a
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
650
2 4
$a
Microsoft.
$3
1387749
650
2 4
$a
Business IT Infrastructure.
$3
1070169
650
2 4
$a
Principles and Models of Security.
$3
1225876
650
2 4
$a
IT Risk Management.
$3
1366666
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Microsoft .NET Framework.
$3
565417
650
0
$a
Microsoft software.
$3
1253736
650
0
$a
Information technology—Management.
$3
1365950
650
0
$a
Computer security.
$3
557122
650
0
$a
Risk management.
$3
559158
650
0
$a
Computer networks—Security measures.
$3
1366173
650
0
$a
Data protection.
$3
557764
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484286272
776
0 8
$i
Printed edition:
$z
9781484286296
856
4 0
$u
https://doi.org/10.1007/978-1-4842-8628-9
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入