Rebinding done by Spiralverse

Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid Spiral-Bound | December 6, 2022

Seth Enoka

★★★★☆+ from Up to 30 ratings

$31.89 - Free Shipping
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion.
Publisher: Penguin Random House
Original Binding: Trade Paperback
Pages: 188 pages
ISBN-10: 171850148X
Item Weight: 1.14 lbs
Dimensions: 7.0 x 0.86 x 9.3 inches
Customer Reviews: 4 out of 5 stars Up to 30 ratings
“An excellent crash course for someone like me with a technical background but little security experience. I've always wanted to beef up my home server and network security but didn't know where to start . . . This book has given me actionable steps I can take today, this week, this month, and beyond. And it gives me the confidence that I'm following reasonable best practices for an actual small network.”
—Chris Miller, GoodReads Reviewer
Seth Enoka has over a decade of experience in IT and cybersecurity, having worked on large and complex security incidents and investigations. He has helped large multinational organizations, government agencies, law enforcement, and local businesses to detect, investigate, and remediate cyber incidents and eradicate adversaries from their networks. Enoka is a leader in performing DFIR at scale with geographically diverse teams and systems, as well as building accredited labs and teams to hunt advanced adversaries and activity groups.

Author Residence: Perth, Australia

Author Hometown: Geraldton, Australia