𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Practical Security Simple Practices for Defending Your Systems

✍ Scribed by Roman Zabricki


Publisher
The Pragamatic Programmers, LLC
Year
2019
Tongue
English
Leaves
134
Edition
1st edition
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have a solid foundation if you bring in a dedicated security staff later. Identify the weaknesses in your system, and defend against the attacks most likely to compromise your organization, without needing to become a trained security professional.

Computer security is a complex issue. But you don't have to be an expert in all the esoteric details to prevent many common attacks. Attackers are opportunistic and won't use a complex attack when a simple one will do. You can get a lot of benefit without too much complexity, by putting systems and processes in place that ensure you aren't making the obvious mistakes. Secure your systems better, with simple (though not always easy) practices.

Plan to patch often to improve your security posture. Identify the most common software vulnerabilities, so you can avoid them when writing software. Discover cryptography - how it works, how easy it is to get wrong, and how to get it right. Configure your Windows computers securely. Defend your organization against phishing attacks with training and technical defenses.

Make simple changes to harden your system against attackers.

What You Need:

You don't need any particular software to follow along with this book. Examples in the book describe security vulnerabilities and how to look for them. These examples will be more interesting if you have access to a code base you've worked on. Similarly, some examples describe network vulnerabilities and how to detect them. These will be more interesting with access to a network you support.


πŸ“œ SIMILAR VOLUMES


Practical Security: Simple Practices for
✍ Roman Zabicki πŸ“‚ Library πŸ“… 2019 πŸ› Pragmatic Bookshelf 🌐 English

<p>Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'l

Defensive Security Handbook: Best Practi
✍ Lee Brotherston; Amanda Berlin πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro

Defensive Security Handbook: Best Practi
✍ Lee Brotherston, Amanda Berlin πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro

Defensive Security Handbook: Best Practi
✍ Amanda Berlin, Lee Brotherston, William Reyor III πŸ“‚ Library πŸ“… 2024 πŸ› O'Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handboo

Defensive Security Handbook: Best Practi
✍ Lee Brotherston, Amanda Berlin πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

<div><p>Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic g