MARC details
000 -LEADER |
fixed length control field |
02478nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250108162344.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250108b ph ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978-1-718-50148-5 |
Terms of availability |
(paperback) |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NU FAIRVIEW |
Modifying agency |
NU FAIRVIEW |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9 E56 2023 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Enoka, Seth, |
Dates associated with a name |
author. |
245 ## - TITLE STATEMENT |
Title |
Cybersecurity for small network : |
Remainder of title |
a no-nonsense guide for the reasonably paranoid / |
Statement of responsibility, etc. |
Seth Enoka |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
San Francisco, CA : |
Name of publisher, distributor, etc. |
No Starch Press, Inc., |
Date of publication, distribution, etc. |
c2023. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 195 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
365 ## - TRADE PRICE |
Price amount |
2,239.00 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction. -- Part 1 : Getting started with a base Linux system and network map. -- Part 2 : Architecting and segmenting your network. -- Part 3 : Filtering network traffic with firewalls. -- Part 4 : Securing wireless networks. -- Part 5 : Creating a virtual private network. -- Part 6 : Improving browsing and privacy with the squid proxy. -- Part 7 : Blocking internet advertisements. -- Part 8 : Detecting, removing, and preventing malware. -- Part 9 : Backing up your data. -- Part 10 : Monitoring your network with detection and alerting. -- Part 11 : For managing user security on your network. -- Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Source of heading or term |
COMPUTER NETWORKS. |
Topical term or geographic name entry element |
SECURITY MEASURES. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Source of heading or term |
COMPUTER NETWORKS. |
Topical term or geographic name entry element |
LOCAL AREA NETWORKS. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Books |
Suppress in OPAC |
No |