Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion.
"1141788339"
Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion.
23.99 In Stock
Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid

Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid

by Seth Enoka
Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid

Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid

by Seth Enoka

eBook

$23.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion.

Product Details

ISBN-13: 9781718501492
Publisher: No Starch Press
Publication date: 12/06/2022
Sold by: Penguin Random House Publisher Services
Format: eBook
Pages: 224
Sales rank: 727,849
File size: 10 MB

About the Author

Seth Enoka has over a decade of experience in IT and cybersecurity, having worked on large and complex security incidents and investigations. He has helped large multinational organizations, government agencies, law enforcement, and local businesses to detect, investigate, and remediate cyber incidents and eradicate adversaries from their networks. Enoka is a leader in performing DFIR at scale with geographically diverse teams and systems, as well as building accredited labs and teams to hunt advanced adversaries and activity groups.

Table of Contents

Introduction
Chapter 1: Getting Started with a Base Linux System and Network Map
Chapter 2: Architecting and Segmenting Your Network
Chapter 3: Filtering Network Traffic with Firewalls
Chapter 4: Securing Wireless Networks
Chapter 5: Creating a Virtual Private Network
Chapter 6: Improving Browsing and Privacy with the Squid Proxy
Chapter 7: Blocking Internet Advertisements
Chapter 8: Detecting, Preventing, and Removing Malware
Chapter 9: Backing Up Your Data
Chapter 10: Monitoring Your Network with Detection and Alerting
Chapter 11: Tips for Managing User Security on Your Network
From the B&N Reads Blog

Customer Reviews