Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English / Denny Cherry.
2022
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English / Denny Cherry.
Author
Cherry, Denny.
ISBN
9781484286289 (electronic bk.)
1484286286 (electronic bk.)
1484286278
9781484286272
1484286286 (electronic bk.)
1484286278
9781484286272
Publication Details
Berkeley, CA : Apress L. P., 2022.
Language
English
Description
1 online resource (153 p.)
Item Number
10.1007/978-1-4842-8628-9 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
658.4/78
Summary
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.
Note
Description based upon print version of record.
Access Note
Access limited to authorized users.
Available in Other Form
Enterprise-Grade IT Security for Small and Medium Businesses
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Introduction
Part I. The Infrastructure
1. Why IT Security Matters
2. Network Design
3. Firewalls
4. Distributed Denial of Service
5. Remote Connectivity
Part II. The Computers
6. Operating System Security
7. Multi-Factor Authentication
8. Zero Trust Environments
Part III. The People
9. Protection Against the Weakest Security Link
10. Employee Training.
Part I. The Infrastructure
1. Why IT Security Matters
2. Network Design
3. Firewalls
4. Distributed Denial of Service
5. Remote Connectivity
Part II. The Computers
6. Operating System Security
7. Multi-Factor Authentication
8. Zero Trust Environments
Part III. The People
9. Protection Against the Weakest Security Link
10. Employee Training.