• Complain

Seth Enoka - Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid

Here you can read online Seth Enoka - Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. publisher: No Starch Press, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Seth Enoka Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid
  • Book:
    Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid
  • Author:
  • Publisher:
    No Starch Press
  • Genre:
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. Youll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion.

Seth Enoka: author's other books


Who wrote Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Cybersecurity for Small Networks A No-Nonsense Guide for the Reasonably Paranoid - image 1

Cybersecurity for Small Networks
Cybersecurity for Small Networks
A No-Nonsense Guide for the Reasonably Paranoid

by Seth Enoka

Cybersecurity for Small Networks A No-Nonsense Guide for the Reasonably Paranoid - image 2

San Francisco

CYBERSECURITY FOR SMALL NETWORKS. Copyright 2023 by Seth Enoka.

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.

First printing

26 25 24 23 22 1 2 3 4 5

ISBN-13: 978-1-7185-0148-5 (print)

ISBN-13: 978-1-7185-0149-2 (ebook)

Publisher: William Pollock

Managing Editor: Jill Franklin

Production Editors: Paula Williamson and Katrina Horlbeck Olsen

Developmental Editors: Jill Franklin and Eva Morrow

Cover Illustrator: Gina Redman

Interior Design: Octopod Studios

Technical Reviewer: Kyle Rankin

Copyeditor: Kim Wimpsett

Compositor: Scribe Inc.

Proofreader: Scribe Inc.

Indexer: BIM Creatives, LLC

For information on distribution, bulk sales, corporate sales, or translations, please contact No Starch Press, Inc. directly at or:

No Starch Press, Inc.

245 8th Street, San Francisco, CA 94103

phone: 1.415.863.9900

www.nostarch.com

Library of Congress Cataloging-in-Publication Data

Names: Enoka, Seth, author.

Title: Cybersecurity for small networks / by Seth Enoka.

Description: San Francisco, CA : No Starch Press, Inc., [2022] | Includes index.

Identifiers: LCCN 2022021005 (print) | LCCN 2022021006 (ebook) | ISBN 9781718501485 (print) | ISBN 9781718501492 (ebook)

Subjects: LCSH: Local area networks (Computer networks)Security measures.

Classification: LCC TK5105.7 .E56 2022 (print) | LCC TK5105.7 (ebook) | DDC 004.6/8dc23/eng/20220707

LC record available at https://lccn.loc.gov/2022021005

LC ebook record available at https://lccn.loc.gov/2022021006

No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.

The information in this book is distributed on an As Is basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.

To my darling wife, without whom I would surely be unable to do all the things

About the Author

Seth Enoka is an IT and cybersecurity veteran, having worked on large and complex cybersecurity incidents and investigations all over the world. When hes not helping organizations kick and keep adversaries out of their networks, you can find him teaching digital forensics and incident response, mentoring and being mentored by others in the security community, working through some degree or certification, or preparing for his next powerlifting competition (whenever that might be...).

About the Technical Reviewer

Kyle Rankin is the chief security officer at Purism and the author of Linux Hardening in Hostile Networks and DevOps Troubleshooting, among other books. Rankin was an award-winning columnist for Linux Journal. He speaks frequently on open source software and has given keynotes at SCALE and FOSDEM.

Brief Contents
Contents in Detail

There are altogether too many individuals I should thank, and Im all too likely to leave out an important name or two, so Id like to acknowledge the cybersecurity community as a whole. Thank you for being as open and generous with your time and expertise as I aspire to be.

This book is an introduction to cybersecurity written to help system and - photo 3

This book is an introduction to cybersecurity, written to help system and network administrators and owners understand the fundamentals of securing a network. Your personal cybersecurity is critical in protecting yourself from fraud and other harmful events attempted by adversaries. Its easy to tell yourself that you cant be a target, that you have nothing an adversary would want to use or exploit. However, your personal identifiable information (PII), protected health information (PHI), intellectual property, and government information and identification all have value. Failing to protect those things can lead to consequences such as identify theft, which can have a serious impact on your life.

For our purposes, a small network consists of 100 or fewer endpoints. An endpoint, or host, is any system or device that connects to or is part of a network, such as a desktop or laptop computer or a mobile device like a phone or tablet. Larger networks, approaching the size of an enterprise network, use similar tools and techniques that are covered in this book to provide security to their users and systems, just on a much larger scale and often at a much higher cost.

The drawback to securing small networks is that you have to maintain and administer everything yourself, with limited support and likely a limited budget. Securing your network will require constant care, and well cover some ways that you can do this cheaply when the need arises. Ultimately, the goal of this book is to arm you with the tools and knowledge to secure your network with whatever resources you have available, in terms of both time and money.

This book is written so that if you follow it logically from chapter to chapter, youll progress through several levels of security maturity, ending with a network that has a defense-in-depth architecture. Defense-in-depth is an approach to cybersecurity where several defensive solutions are layered to protect valuable data and information. focus on the value of regular backups and active defenses, whereby you receive and respond to alerts to suspicious or malicious activity in your network, enabling cyber incident response.

Most chapters contain stand-alone projects. You can choose to complete each project in order, or you can pick and choose which projects you want to complete. However, the concepts covered in earlier chapters on network architecture provide the best return on investment, in terms of both time and money, and require less ongoing support and maintenance. The later chapters that cover active defenses require constant monitoring and are made more efficient with the completion of earlier projects. In some cases, working through the projects in earlier chapters also provides baseline knowledge that may be useful in later projects, such as familiarity with the command line. Essentially, you should complete each chapter in whichever order makes the most sense for you and your environment; for example, if you already have host and network firewalls in place, you can probably skip .

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid»

Look at similar books to Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid»

Discussion, reviews of the book Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.