Cybersecurity essentials / (Record no. 934)

MARC details
000 -LEADER
fixed length control field 03039cam a22003497i 4500
001 - CONTROL NUMBER
control field 20488508
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241117085513.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180508s2018 inua 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2018943782
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119362395
040 ## - CATALOGING SOURCE
Transcribing agency WBT
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .B766 2018
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Brooks, Charles J.,
Relator term author.
9 (RLIN) 2354
245 10 - TITLE STATEMENT
Title Cybersecurity essentials /
Statement of responsibility, etc. Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
246 3# - VARYING FORM OF TITLE
Title proper/short title Cyber security essentials
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, Indiana :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons Inc.,
Date of production, publication, distribution, manufacture, or copyright notice 2018
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2018
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 758 pages :
Other physical details illustrations ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.
520 ## - SUMMARY, ETC.
Summary, etc. "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 2355
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 2356
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872341
9 (RLIN) 2357
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872484
9 (RLIN) 2358
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Grow, Christopher,
Relator term author.
9 (RLIN) 2359
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Craig, Philip
Titles and other words associated with a name (Engineer),
Relator term author.
9 (RLIN) 2360
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Short, Donald,
Relator term author.
9 (RLIN) 2361
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Date last seen Total Checkouts Full call number Barcode Price effective from Koha item type Lost status Source of classification or shelving scheme Damaged status Not for loan Withdrawn status Home library Current library Date acquired
11/17/2024   TK5105.59 .B766 2018 004688 11/17/2024 Books   Library of Congress Classification       Muscat University Library Muscat University Library 11/17/2024
11/17/2024   TK5105.59 .B766 2018 004689 11/17/2024 Books   Library of Congress Classification       Muscat University Library Muscat University Library 11/17/2024
11/17/2024   TK5105.59 .B766 2018 004690 11/17/2024 Books   Library of Congress Classification       Muscat University Library Muscat University Library 11/17/2024