Cybersecurity: essentials (Record no. 677)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02209nam a2200241Ia 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250404125137.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230421s2018||||xx |||||||||||||| ||eng|| |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119362395 |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 B76 |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Brooks, Charles J. |
Relator term | Author |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Grow, Christopher |
Relator term | Co-Author |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Craig, Philip |
Relator term | Co-Author |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Short, Donald |
Relator term | Co-Author |
245 #0 - TITLE STATEMENT | |
Title | Cybersecurity: essentials |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | USA: |
Name of publisher | Wiley, |
Year of publication | 2018. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xxvi, 758p.; 22cms. |
500 ## - GENERAL NOTE | |
General note | An accessible introduction to cybersecurity concepts and practices<br/>Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.<br/><br/>Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.<br/><br/>Learn security and surveillance fundamentals<br/>Secure and protect remote access and devices<br/>Understand network topologies, protocols, and strategies<br/>Identify threats and mount an effective defense<br/>Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer Science |
General subdivision | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
General subdivision | Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
General subdivision | Computers |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|---|---|---|---|
Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | General Stacks | 005.8 B76 | 2674 | Books |