Introduction.- Part I. The Infrastructure.- 1. Why IT Security Matters.- 2. Network Design.- 3. Firewalls.- 4. Distributed Denial of Service.- 5. Remote Connectivity.- .- Part II. The Computers.- 6. Operating System Security.- 7. Multi-Factor Authentication.- 8. Zero Trust Environments.- Part III. The People.- 9. Protection Against the Weakest Security Link.- 10. Employee Training.
Denny Cherry has been working in the information technology field for ore than 20 years and has written almost a dozen IT books and hundreds of articles for various publications, including Inc., MSDN Magazine, and SQL Server Magazine, as well as having spoken at dozens of conferences around the world. He holds the Microsoft Certified Master certification, has been awarded the Microsoft Most Valuable Professional (MVP) award annually for more than 15 years, and has been awarded the VMware vExpert award six times. His public speaking started at local events in Southern California where he lives with his wife and their pet bunny rabbits and has expanded out to events worldwide. Speaking at conferences has taken Denny to six continents and over a dozen countries where he speaks at both small local events as well as large industry and corporate events.
![]() |
Ask a Question About this Product More... |
![]() |