KHO THƯ VIỆN 🔎

B06Y18XC5Y kho tài liệu bách khoa

➤  Gửi thông báo lỗi    ⚠️ Báo cáo tài liệu vi phạm

Loại tài liệu:     PDF
Số trang:         476 Trang
Tài liệu:           ✅  ĐÃ ĐƯỢC PHÊ DUYỆT
 











Nội dung chi tiết: B06Y18XC5Y kho tài liệu bách khoa

B06Y18XC5Y kho tài liệu bách khoa

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoar Securing InfrastructureLee Brothcrston and Amanda BerlinDefensive Security Handbookby Lee Brotherston and Amanda Berlin Copylight © 2017 Lee Brother

ston U..M X UIIUIMM VMUU. 211.tigMW reserved.Printed in the United States of America.Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North B06Y18XC5Y kho tài liệu bách khoa

, Sebastopol, CA 95472.O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for mos

B06Y18XC5Y kho tài liệu bách khoa

t titles (http://oreiily.coni/safari). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate(a)oreilly

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoaen Troutman-Zaig■Interior Designer: David Futato■Cover Designer: Karen Montgomery■Illustrator: Rebecca DemarestApril 2017: First EditionRevision Histo

ry for the First Edition■ 2017-03-31: First ReleaseSee http://oreilly.com'catalog'errata.csp?isbn=9781491960387 for release details.The O’Reilly logo B06Y18XC5Y kho tài liệu bách khoa

is a registered ưademark of O’Reilly Media, Inc. Defensive Security Handbook, the cover image, and related trade dress are trademarks of O’Reilly Medi

B06Y18XC5Y kho tài liệu bách khoa

a, Inc.While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in Illis work are ac

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoaulting from the use of or reliance on Illis work. Use of die information and instructions contained in this work is at your own risk. If any code samp

les or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your r B06Y18XC5Y kho tài liệu bách khoa

esponsibility to ensure that your use diereof complies with such licenses and/or rights.978-1-491-96038-7[LSI]ForewordSpend any time in the informatio

B06Y18XC5Y kho tài liệu bách khoa

n securin' world, and it will become quicklj v.íuvin UMIVI UK. press and accolades go to those folks working on the offensive side of security. From f

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoaed teams get all the glory. But there is more — much more — to the security world than just offense.Being on the defensive side, the blue team, can se

em a lonely, unappreciated battle. But doing defense is a vital, noble, and worthwhile pursuit. We defenders matter, greatly, to the future of our org B06Y18XC5Y kho tài liệu bách khoa

anizations and the jobs and livelihoods of our coworkers. When the bad guys win, people lose their jobs, organizations are distracted from their core

B06Y18XC5Y kho tài liệu bách khoa

goals, and the bad guys are often enriched to continue their nefarious pursuits. And, like something out of a cyberpunk novel, with the trend of the I

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoaineers, running perhaps a firewall or IDS platform for our employer. Though those skills are highly valued, moving beyond them to a more holistic view

of defensive security can sometimes be a challenge without die right resources to bring a bigger picture view. As we continue to experience a shortag B06Y18XC5Y kho tài liệu bách khoa

e of valuable information security defensive talent, we will need more folks than ever to continue to learn and grow into die defensive security role;

B06Y18XC5Y kho tài liệu bách khoa

and to do it well, they need a holistic view of die security landscape.Another challenge we often face is that a great deal of the narrative around d

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoarketing presentations. Though a lot can be learned from vendors in die space, as they are laser focused on the problems organizations are trying to so

lve, they also have a sometimes narrow view of the world. IT Security Vendors will often define the problem set as the problem they can solve with die B06Y18XC5Y kho tài liệu bách khoa

ir technology, not necessarily the problem an organization actually lias. Countering that view with a holistic view of defensive security' is vital to

B06Y18XC5Y kho tài liệu bách khoa

helping organizations become as secure as they can be.Tills is why I am so honored to write die forward for the Defensive Security Handbook. The worl

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoawho came before. This book does a great job of laying out key principles and skills, and giving a broad overview of the complex and growing landscape

of the defensive security side of the world. Amanda Berlin and Lee Brotherston have laid out an overview of the multifaceted world of defensive securi B06Y18XC5Y kho tài liệu bách khoa

ty'. Certainly, whole books have been written on tiny segments of the topics covered, but tills handbook does a marvelous job of giving a defensive se

B06Y18XC5Y kho tài liệu bách khoa

curity professional an overview of the myriad of skill sets necessary to be successful. This handbook is a great primer for those new to the world of

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

B06Y18XC5Y kho tài liệu bách khoag to make sure they are covering all their bases.I think you’ll find this a valuable resource to keep nearby and reference throughout your career. Bes

t of luck on your path, and remember to keep fighting the good fight. Even when it may seem lonely and tough, remember what you are doing matters, and B06Y18XC5Y kho tài liệu bách khoa

there are many out there who can and will help. Amanda and Lee have done a great job sharing tlieir experience; now it’s up to US to learn from their

B06Y18XC5Y kho tài liệu bách khoa

experience.

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

O’REILLY’DefensiveSecurityHandbookBEST PRACTICES FOR SECURING INFRASTRUCTURELee Brotherston & Amanda BerlinDefensive Security Handl Best Practices for

Gọi ngay
Chat zalo
Facebook