000 02478nam a22002417a 4500
003 NU
005 20250108162344.0
008 250108b ph ||||| |||| 00| 0 eng d
020 _a978-1-718-50148-5
_c(paperback)
040 _cNU FAIRVIEW
_dNU FAIRVIEW
050 _aQA 76.9 E56 2023
100 _aEnoka, Seth,
_dauthor.
245 _aCybersecurity for small network :
_ba no-nonsense guide for the reasonably paranoid /
_cSeth Enoka
260 _aSan Francisco, CA :
_bNo Starch Press, Inc.,
_cc2023.
300 _axv, 195 pages :
_billustrations ;
_c23 cm.
365 _b2,239.00
504 _aIncludes index.
505 _aIntroduction. -- Part 1 : Getting started with a base Linux system and network map. -- Part 2 : Architecting and segmenting your network. -- Part 3 : Filtering network traffic with firewalls. -- Part 4 : Securing wireless networks. -- Part 5 : Creating a virtual private network. -- Part 6 : Improving browsing and privacy with the squid proxy. -- Part 7 : Blocking internet advertisements. -- Part 8 : Detecting, removing, and preventing malware. -- Part 9 : Backing up your data. -- Part 10 : Monitoring your network with detection and alerting. -- Part 11 : For managing user security on your network. -- Index.
520 _aThis book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available.
650 _2COMPUTER NETWORKS.
_aSECURITY MEASURES.
650 _2COMPUTER NETWORKS.
_aLOCAL AREA NETWORKS.
942 _2lcc
_cBK
_n0
999 _c5477
_d5477