Cybersecurity essentials / (Record no. 934)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03039cam a22003497i 4500 |
001 - CONTROL NUMBER | |
control field | 20488508 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20241117085513.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180508s2018 inua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2018943782 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119362395 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | WBT |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
Item number | .B766 2018 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Brooks, Charles J., |
Relator term | author. |
9 (RLIN) | 2354 |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity essentials / |
Statement of responsibility, etc. | Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
246 3# - VARYING FORM OF TITLE | |
Title proper/short title | Cyber security essentials |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Indianapolis, Indiana : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons Inc., |
Date of production, publication, distribution, manufacture, or copyright notice | 2018 |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2018 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvi, 758 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 2355 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
9 (RLIN) | 2356 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number or standard number | (OCoLC)fst00872341 |
9 (RLIN) | 2357 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
Source of heading or term | fast |
Authority record control number or standard number | (OCoLC)fst00872484 |
9 (RLIN) | 2358 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Grow, Christopher, |
Relator term | author. |
9 (RLIN) | 2359 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Craig, Philip |
Titles and other words associated with a name | (Engineer), |
Relator term | author. |
9 (RLIN) | 2360 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Short, Donald, |
Relator term | author. |
9 (RLIN) | 2361 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Date last seen | Total Checkouts | Full call number | Barcode | Price effective from | Koha item type | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Withdrawn status | Home library | Current library | Date acquired |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
11/17/2024 | TK5105.59 .B766 2018 | 004688 | 11/17/2024 | Books | Library of Congress Classification | Muscat University Library | Muscat University Library | 11/17/2024 | |||||
11/17/2024 | TK5105.59 .B766 2018 | 004689 | 11/17/2024 | Books | Library of Congress Classification | Muscat University Library | Muscat University Library | 11/17/2024 | |||||
11/17/2024 | TK5105.59 .B766 2018 | 004690 | 11/17/2024 | Books | Library of Congress Classification | Muscat University Library | Muscat University Library | 11/17/2024 |