logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Defensive Security Handbook Best Practices For Securing Infrastructure 2nd Edition Amanda Berlin

  • SKU: BELL-63479358
Defensive Security Handbook Best Practices For Securing Infrastructure 2nd Edition Amanda Berlin
$ 31.00 $ 45.00 (-31%)

5.0

90 reviews

Defensive Security Handbook Best Practices For Securing Infrastructure 2nd Edition Amanda Berlin instant download after payment.

Publisher: O'Reilly Media
File Extension: PDF
File size: 8.8 MB
Pages: 285
Author: Amanda Berlin, Lee Brotherston, William Reyor III
ISBN: 9781098127244, 1098127242
Language: English
Year: 2024
Edition: 2

Product desciption

Defensive Security Handbook Best Practices For Securing Infrastructure 2nd Edition Amanda Berlin by Amanda Berlin, Lee Brotherston, William Reyor Iii 9781098127244, 1098127242 instant download after payment.

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.

This book will help you

Plan and design incident response, disaster recovery, compliance, and physical security

Learn and apply basic penetration testing concepts through purple teaming

Conduct vulnerability management using automated processes and tools

Use IDS, IPS, SOC, logging, and monitoring

Bolster Microsoft and Unix systems, network infrastructure, and password management

Use segmentation practices and designs to compartmentalize your network

Reduce exploitable errors by developing code securely

Related Products