001449797 000__ 03208cam\a2200445\a\4500 001449797 001__ 1449797 001449797 003__ OCoLC 001449797 005__ 20230310004419.0 001449797 006__ m\\\\\o\\d\\\\\\\\ 001449797 007__ cr\cn\nnnunnun 001449797 008__ 220924s2022\\\\cau\\\\\o\\\\\000\0\eng\d 001449797 019__ $$a1345580004 001449797 020__ $$a9781484286289$$q(electronic bk.) 001449797 020__ $$a1484286286$$q(electronic bk.) 001449797 020__ $$z1484286278 001449797 020__ $$z9781484286272 001449797 0247_ $$a10.1007/978-1-4842-8628-9$$2doi 001449797 035__ $$aSP(OCoLC)1345589445 001449797 040__ $$aEBLCP$$beng$$cEBLCP$$dORMDA$$dGW5XE$$dYDX$$dEBLCP$$dOCLCF$$dOCLCQ$$dTOH$$dOCLCQ 001449797 049__ $$aISEA 001449797 050_4 $$aQA76.9.A25 001449797 08204 $$a658.4/78$$223/eng/20220928 001449797 1001_ $$aCherry, Denny. 001449797 24510 $$aEnterprise-Grade IT Security for Small and Medium Businesses:$$bBuilding Security Systems, in Plain English /$$cDenny Cherry. 001449797 260__ $$aBerkeley, CA :$$bApress L. P.,$$c2022. 001449797 300__ $$a1 online resource (153 p.) 001449797 500__ $$aDescription based upon print version of record. 001449797 5050_ $$aIntroduction -- Part I. The Infrastructure -- 1. Why IT Security Matters -- 2. Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. Remote Connectivity -- -- Part II. The Computers -- 6. Operating System Security -- 7. Multi-Factor Authentication -- 8. Zero Trust Environments -- Part III. The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training. 001449797 506__ $$aAccess limited to authorized users. 001449797 520__ $$aUnderstand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. 001449797 650_0 $$aSmall business$$xComputer networks$$xSecurity measures. 001449797 650_0 $$aBusiness enterprises$$xComputer networks$$xSecurity measures. 001449797 655_0 $$aElectronic books. 001449797 77608 $$iPrint version:$$aCherry, Denny$$tEnterprise-Grade IT Security for Small and Medium Businesses$$dBerkeley, CA : Apress L. P.,c2022$$z9781484286272 001449797 852__ $$bebk 001449797 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-8628-9$$zOnline Access$$91397441.1 001449797 909CO $$ooai:library.usi.edu:1449797$$pGLOBAL_SET 001449797 980__ $$aBIB 001449797 980__ $$aEBOOK 001449797 982__ $$aEbook 001449797 983__ $$aOnline 001449797 994__ $$a92$$bISE