Defensive Security Handbook
Best Practices for Securing Infrastructure
Publisher: O'Reilly Media
Final Release Date: July 2016
Pages: 250

With Early Release ebooks, you get books in their earliest form—the author's raw and unedited content as he or she writes—so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters are available, and the final ebook bundle is released.

Get defensive best practices and a diverse range of triage advice for securing various networks in your organization’s infrastructure. This step-by-step guide demonstrates how to develop and maintain well-planned infrastructures to protect your organization’s data. If you’re a network or system administrator, this practical guide will help you design, maintain, and secure your network infrastructure, Microsoft Windows system, Unix application servers, development environment, and many other systems.

Authors and information security experts Lee Brotherston and Amanda Berlin also cover password management, user education, automated vulnerability management, purple teaming—defensive professionals (blue team) learning and practicing offensive (red team) techniques—as well as endpoints, segmentation, and patching. Whether you are part of a small tech company or a Fortune 100 enterprise, the practical advice in this book is invaluable.

Topics include:

  • Microsoft Windows infrastructure
  • Unix application servers
  • Network infrastructure
  • Password management and two-factor authentication
  • Vulnerability management
  • Policy templates and must haves
  • Segmentation
  • Purple teaming
  • User education
  • Documentation
  • Endpoints
  • Development
  • IDS, IPS, and SOC
  • Industry compliance standards
  • Continuity management
  • VPNs and proxies
  • Physical security
Table of Contents
Product Details
About the Author
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillyDefensive Security Handbook
 
4.0

(based on 2 reviews)

Ratings Distribution

  • 5 Stars

     

    (1)

  • 4 Stars

     

    (0)

  • 3 Stars

     

    (1)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 2 customers

Displaying reviews 1-2

Back to top

(5 of 5 customers found this review helpful)

 
5.0

Excellent content and more to come

By ihatenicknames

from San Francisco, CA

About Me Developer, Technical Manager

Verified Reviewer

Pros

  • Accurate
  • Easy to understand
  • Helpful examples
  • Well-written

Cons

  • Still Being Written

Best Uses

  • Intermediate
  • Novice
  • Student

Comments about oreilly Defensive Security Handbook:

This book is shaping up to be an excellent resource for those who find themselves suddenly wearing an infosec hat. Since only 4 of the 19 chapters are available as of this review, I cannot speak for the entire work but the existing material is quite good - especially the multifactor authentication and app server portions.

I'm excited for it to be published so we can add a couple copies to our engineering library.

(1 of 1 customers found this review helpful)

 
3.0

Eagerly awaiting the next update

By FormerlyBoyGenius

from Chicago, IL

About Me Sys Admin

Verified Buyer

Pros

  • Easy to understand
  • Helpful examples

Cons

  • Not comprehensive enough

Best Uses

    Comments about oreilly Defensive Security Handbook:

    As of 8/11, the book is still in a very early state. I love the idea and the content so far and am eagerly awaiting the next update.

    Displaying reviews 1-2

    Back to top

     
    Buy 2 Get 1 Free Free Shipping Guarantee
    Buying Options
    Immediate Access - Go Digital what's this?
    Pre-Order  Print:  $39.99
    March 2017 (est.)