• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English

ISBN-13: 9781484286272 / Angielski / Miękka / 2022

Denny Cherry
Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English Cherry, Denny 9781484286272 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English

ISBN-13: 9781484286272 / Angielski / Miękka / 2022

Denny Cherry
cena 228,02
(netto: 217,16 VAT:  5%)

Najniższa cena z 30 dni: 227,39
Termin realizacji zamówienia:
ok. 16-18 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. 


Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. 


You Will Learn
  • The importance of multi-factor authentication
  • The limits of what multi-factor authentication can protect
  • How firewalls are used to protect your company from attackers
  • What zero-trust environments are and what they mean
  • Whether zero-trust networks are what is needed to secure your own environment
  • The security benefits from implementing a network segmentation policy
  • The best ways to access files and resources from remote locations outside the office

Who This Book Is For

Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their business relies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement


Intermediate user level

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - Network Security
Business & Economics > Insurance - Risk Assessment & Management
Computers > Business & Productivity Software - General
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484286272
Rok wydania:
2022
Waga:
0.27 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Introduction


Part I. The Infrastructure
1. Why IT Security Matters
2. Network Design
3. Firewalls
4. Distributed Denial of Service
5. Remote Connectivity

Part II. The Computers
6. Operating System Security
7. Multi-Factor Authentication
8. Zero Trust Environments

Part III. The People
9. Protection Against the Weakest Security Link
10. Employee Training

​Denny Cherry has been working in the information technology field for ore than 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN Magazine, and SQL Server Magazine, as well as having spoken at dozens of conferences around the world. He holds the Microsoft Certified Master certification, has been awarded the Microsoft Most Valuable Professional (MVP) award annually for more than 15 years, and has been awarded the VMware vExpert award six times. His public speaking started at local events in Southern California where he lives with his wife and their pet bunny rabbits and has expanded out to events worldwide. Speaking at conferences has taken Denny to six continents and over a dozen countries where he speaks at both small local events as well as large industry and corporate events.

Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. 


Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. 

You Will Learn:
  • The importance of multi-factor authentication
  • The limits of what multi-factor authentication can protect
  • How firewalls are used to protect your company from attackers
  • What zero-trust environments are and what they mean
  • Whether zero-trust networks are what is needed to secure your own environment
  • The security benefits from implementing a network segmentation policy
  • The best ways to access files and resources from remote locations outside the office




Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia