Defensive Security Handbook: Best Practices for Securing Infrastructure by Brotherston, Lee

Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the...
$100.70 SGD
$100.70 SGD
SKU: 9781491960387
Product Type: Books
Please hurry! Only 0 left in stock
Author: Lee Brotherston
Format: Paperback
Language: English
Subtotal: $100.70
10 customers are viewing this product
Defensive Security Handbook: Best Practices for Securing Infrastructure by Brotherston, Lee

Defensive Security Handbook: Best Practices for Securing Infrastructure

$100.70

Defensive Security Handbook: Best Practices for Securing Infrastructure

$100.70
Author: Lee Brotherston
Format: Paperback
Language: English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.

  • Learn fundamentals of starting or redesigning an InfoSec program
  • Create a base set of policies, standards, and procedures
  • Plan and design incident response, disaster recovery, compliance, and physical security
  • Bolster Microsoft and Unix systems, network infrastructure, and password management
  • Use segmentation practices and designs to compartmentalize your network
  • Explore automated process and tools for vulnerability management
  • Securely develop code to reduce exploitable errors
  • Understand basic penetration testing concepts through purple teaming
  • Delve into IDS, IPS, SOC, logging, and monitoring


Author: Lee Brotherston, Amanda Berlin
Publisher: O'Reilly Media
Published: 05/02/2017
Pages: 284
Binding Type: Paperback
Weight: 0.90lbs
Size: 9.00h x 6.90w x 0.50d
ISBN: 9781491960387

About the Author

Lee Brotherston is a Senior Security Advisor with Leviathan Security, providing Information Security consulting services to a range of clients. Having spent more than a decade in Information Security, Lee has worked as an Internal Security resource across many verticals including Finance, Telecommunications, Hospitality, Entertainment, and Government in roles ranging from Engineer to IT Security Manager.

Amanda Berlin is an Information Security Architect for a consulting firm in Northern Ohio. She has spent over a decade in different areas of technology and sectors providing infrastructure support, triage, and design. Amanda has been involved in implementing a secure Payment Card Industries (PCI) process and Health Insurance Portability and Accountability Act (HIPAA) compliance as well as building a comprehensive phishing and awards-based user education program. She is the author for a Blue Team best practices book called Defensive Security Handbook: Best Practices for Securing Infrastructure through O'Reilly Media. She is a co-host on the Brakeing Down Security podcast and writes for several blogs. On Twitter, she's @InfoSystir.


Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products