Torrent details for "Cherry D. Enterprise-Grade IT Security for...Businesses...2022 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
4.36 MB
Info Hash:
5fc9c055668dace99c5a78591eba241bae6f4919
Added By:
Added:  
17-09-2022 17:28
Views:
108
Health:
Seeds:
0
Leechers:
0
Completed:
188
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability.
Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.
You Will Learn:
The importance of multi-factor authentication
The limits of what multi-factor authentication can protect
How firewalls are used to protect your company from attackers
What zero-trust environments are and what they mean
Whether zero-trust networks are what is needed to secure your own environment
The security benefits from implementing a network segmentation policy
The best ways to access files and resources from remote locations outside the office
Who This Book Is For:
Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their business relies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement
Part I:
The Infrastructure 1
Chapter 1: Why IT Security Matters
Chapter 2: Network Design
Chapter 3: Firewalls
Chapter 4: Distributed Denial of Service
Chapter 5: Remote Connectivity
Part II:
The Computers
Chapter 6: Computer Operating System Security
Chapter 7: Multi-Factor Authentication
Chapter 8: Zero-Trust Environments
Part III:
The People
Chapter 9: The Weakest Security Link—People
Chapter 10: Employee Training
Index

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes