Cybersecurity for small network : a no-nonsense guide for the reasonably paranoid / Seth Enoka
Material type:
Item type | Current library | Home library | Collection | Shelving location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|
![]() |
NU Fairview College LRC | NU Fairview College LRC | School of Engineering and Technology | General Circulation | GC QA 76.9 E56 2023 (Browse shelf(Opens below)) | Available | NUFAI000005491 |
Browsing NU Fairview College LRC shelves, Shelving location: General Circulation, Collection: School of Engineering and Technology Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.6 S46 2024 Python all-in-one : for dummies / | GC QA 76.7 W36 2022 Beginning Programming All-in-One For Dummies, 2nd Edition / | GC QA 76.9 C66 2009 Computing made easy for the over 50's | GC QA 76.9 E56 2023 Cybersecurity for small network : a no-nonsense guide for the reasonably paranoid / | GC QA 76.9 F69 2024 Computer architecture : from the stone age to the quantum age / | GC QA 76.9 G73 2022 Practical social engineering : a primer for the ethical hacker / | GC QA 76.9 K37 2020 Data structures and algorithms made easy : data structures and algorithmic puzzles / |
Includes index.
Introduction. -- Part 1 : Getting started with a base Linux system and network map. -- Part 2 : Architecting and segmenting your network. -- Part 3 : Filtering network traffic with firewalls. -- Part 4 : Securing wireless networks. -- Part 5 : Creating a virtual private network. -- Part 6 : Improving browsing and privacy with the squid proxy. -- Part 7 : Blocking internet advertisements. -- Part 8 : Detecting, removing, and preventing malware. -- Part 9 : Backing up your data. -- Part 10 : Monitoring your network with detection and alerting. -- Part 11 : For managing user security on your network. -- Index.
This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available.
There are no comments on this title.