Cybersecurity: essentials (Record no. 677)

MARC details
000 -LEADER
fixed length control field 02209nam a2200241Ia 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250404125137.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230421s2018||||xx |||||||||||||| ||eng||
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119362395
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 B76
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Brooks, Charles J.
Relator term Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Grow, Christopher
Relator term Co-Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Craig, Philip
Relator term Co-Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Short, Donald
Relator term Co-Author
245 #0 - TITLE STATEMENT
Title Cybersecurity: essentials
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication USA:
Name of publisher Wiley,
Year of publication 2018.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxvi, 758p.; 22cms.
500 ## - GENERAL NOTE
General note An accessible introduction to cybersecurity concepts and practices<br/>Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.<br/><br/>Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.<br/><br/>Learn security and surveillance fundamentals<br/>Secure and protect remote access and devices<br/>Understand network topologies, protocols, and strategies<br/>Identify threats and mount an effective defense<br/>Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science
General subdivision Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Computer networks--Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Computers
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library General Stacks 005.8 B76 2674 Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha