New ArrivalsHealth & WellnessValentine’s DayClothing, Shoes & AccessoriesHomeKitchen & DiningGroceryHousehold EssentialsFurnitureOutdoor Living & GardenBabyToysVideo GamesElectronicsMovies, Music & BooksBeautyPersonal CareGift IdeasParty SuppliesCharacter ShopSports & OutdoorsBackpacks & LuggageSchool & Office SuppliesPetsUlta Beauty at TargetTarget OpticalGift CardsBullseye’s PlaygroundDealsClearanceTarget New Arrivals Target Finds #TargetStyleStore EventsAsian-Owned Brands at TargetBlack-Owned or Founded Brands at TargetLatino-Owned Brands at TargetWomen-Owned Brands at TargetLGBTQIA+ ShopTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Enterprise-Grade It Security for Small and Medium Businesses - by  Denny Cherry (Paperback) - 1 of 1

Enterprise-Grade It Security for Small and Medium Businesses - by Denny Cherry Paperback

$45.49Save $14.50 (24% off)

In Stock

Eligible for registries and wish lists

About this item

Highlights

  • Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business.
  • About the Author: ​Denny Cherry has been working in the information technology field for ore than 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN Magazine, and SQL Server Magazine, as well as having spoken at dozens of conferences around the world.
  • 153 Pages
  • Computers + Internet, Security

Description



Book Synopsis



Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability.
Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.

You Will Learn

  • The importance of multi-factor authentication
  • The limits of what multi-factor authentication can protect
  • How firewalls are used to protect your company from attackers
  • What zero-trust environments are and what they mean
  • Whether zero-trust networks are what is needed to secure your own environment
  • The security benefits from implementing a network segmentation policy
  • The best ways to access files and resources from remote locations outside the office

Who This Book Is For
Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their businessrelies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement



From the Back Cover



Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability.
Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits.
You Will Learn:
  • The importance of multi-factor authentication
  • The limits of what multi-factor authentication can protect
  • How firewalls are used to protect your company from attackers
  • What zero-trust environments are and what they mean
  • Whether zero-trust networks are what is needed to secure your own environment
  • The security benefits from implementing a network segmentation policy
  • The best ways to access files and resources from remote locations outside the office



About the Author



​Denny Cherry has been working in the information technology field for ore than 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN Magazine, and SQL Server Magazine, as well as having spoken at dozens of conferences around the world. He holds the Microsoft Certified Master certification, has been awarded the Microsoft Most Valuable Professional (MVP) award annually for more than 15 years, and has been awarded the VMware vExpert award six times. His public speaking started at local events in Southern California where he lives with his wife and their pet bunny rabbits and has expanded out to events worldwide. Speaking at conferences has taken Denny to six continents and over a dozen countries where he speaks at both small local events as well as large industry and corporate events.
Dimensions (Overall): 9.21 Inches (H) x 6.14 Inches (W) x .36 Inches (D)
Weight: .54 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 153
Genre: Computers + Internet
Sub-Genre: Security
Publisher: Apress
Theme: Networking
Format: Paperback
Author: Denny Cherry
Language: English
Street Date: September 17, 2022
TCIN: 1008785226
UPC: 9781484286272
Item Number (DPCI): 247-29-7145
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.36 inches length x 6.14 inches width x 9.21 inches height
Estimated ship weight: 0.54 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.

Additional product information and recommendations

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member ServicesLegal & Privacy

Stores

Find a StoreClinicPharmacyTarget OpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacy PolicyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy