B06Y18XC5Y kho tài liệu bách khoa
➤ Gửi thông báo lỗi ⚠️ Báo cáo tài liệu vi phạmNội dung chi tiết: B06Y18XC5Y kho tài liệu bách khoa
B06Y18XC5Y kho tài liệu bách khoa
O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoar Securing InfrastructureLee Brothcrston and Amanda BerlinDefensive Security Handbookby Lee Brotherston and Amanda Berlin Copylight © 2017 Lee Brotherston U..M X UIIUIMM VMUU. 211.tigMW reserved.Printed in the United States of America.Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North B06Y18XC5Y kho tài liệu bách khoa, Sebastopol, CA 95472.O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for mosB06Y18XC5Y kho tài liệu bách khoa
t titles (http://oreiily.coni/safari). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate(a)oreillyO’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoaen Troutman-Zaig■Interior Designer: David Futato■Cover Designer: Karen Montgomery■Illustrator: Rebecca DemarestApril 2017: First EditionRevision History for the First Edition■ 2017-03-31: First ReleaseSee http://oreilly.com'catalog'errata.csp?isbn=9781491960387 for release details.The O’Reilly logo B06Y18XC5Y kho tài liệu bách khoais a registered ưademark of O’Reilly Media, Inc. Defensive Security Handbook, the cover image, and related trade dress are trademarks of O’Reilly MediB06Y18XC5Y kho tài liệu bách khoa
a, Inc.While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in Illis work are acO’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoaulting from the use of or reliance on Illis work. Use of die information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your r B06Y18XC5Y kho tài liệu bách khoaesponsibility to ensure that your use diereof complies with such licenses and/or rights.978-1-491-96038-7[LSI]ForewordSpend any time in the informatioB06Y18XC5Y kho tài liệu bách khoa
n securin' world, and it will become quicklj v.íuvin UMIVI UK. press and accolades go to those folks working on the offensive side of security. From fO’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoaed teams get all the glory. But there is more — much more — to the security world than just offense.Being on the defensive side, the blue team, can seem a lonely, unappreciated battle. But doing defense is a vital, noble, and worthwhile pursuit. We defenders matter, greatly, to the future of our org B06Y18XC5Y kho tài liệu bách khoaanizations and the jobs and livelihoods of our coworkers. When the bad guys win, people lose their jobs, organizations are distracted from their coreB06Y18XC5Y kho tài liệu bách khoa
goals, and the bad guys are often enriched to continue their nefarious pursuits. And, like something out of a cyberpunk novel, with the trend of the IO’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoaineers, running perhaps a firewall or IDS platform for our employer. Though those skills are highly valued, moving beyond them to a more holistic view of defensive security can sometimes be a challenge without die right resources to bring a bigger picture view. As we continue to experience a shortag B06Y18XC5Y kho tài liệu bách khoae of valuable information security defensive talent, we will need more folks than ever to continue to learn and grow into die defensive security role;B06Y18XC5Y kho tài liệu bách khoa
and to do it well, they need a holistic view of die security landscape.Another challenge we often face is that a great deal of the narrative around dO’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoarketing presentations. Though a lot can be learned from vendors in die space, as they are laser focused on the problems organizations are trying to solve, they also have a sometimes narrow view of the world. IT Security Vendors will often define the problem set as the problem they can solve with die B06Y18XC5Y kho tài liệu bách khoair technology, not necessarily the problem an organization actually lias. Countering that view with a holistic view of defensive security' is vital toB06Y18XC5Y kho tài liệu bách khoa
helping organizations become as secure as they can be.Tills is why I am so honored to write die forward for the Defensive Security Handbook. The worlO’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoawho came before. This book does a great job of laying out key principles and skills, and giving a broad overview of the complex and growing landscape of the defensive security side of the world. Amanda Berlin and Lee Brotherston have laid out an overview of the multifaceted world of defensive securi B06Y18XC5Y kho tài liệu bách khoaty'. Certainly, whole books have been written on tiny segments of the topics covered, but tills handbook does a marvelous job of giving a defensive seB06Y18XC5Y kho tài liệu bách khoa
curity professional an overview of the myriad of skill sets necessary to be successful. This handbook is a great primer for those new to the world of O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for B06Y18XC5Y kho tài liệu bách khoag to make sure they are covering all their bases.I think you’ll find this a valuable resource to keep nearby and reference throughout your career. Best of luck on your path, and remember to keep fighting the good fight. Even when it may seem lonely and tough, remember what you are doing matters, and B06Y18XC5Y kho tài liệu bách khoa there are many out there who can and will help. Amanda and Lee have done a great job sharing tlieir experience; now it’s up to US to learn from theirB06Y18XC5Y kho tài liệu bách khoa
experience.O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices forO’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices forGọi ngay
Chat zalo
Facebook