000 03039cam a22003497i 4500
001 20488508
003 OSt
005 20241117085513.0
008 180508s2018 inua 001 0 eng d
010 _a 2018943782
020 _a9781119362395
040 _cWBT
050 0 0 _aTK5105.59
_b.B766 2018
082 0 4 _a005.8
_223
100 1 _aBrooks, Charles J.,
_eauthor.
_92354
245 1 0 _aCybersecurity essentials /
_cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
246 3 _aCyber security essentials
264 1 _aIndianapolis, Indiana :
_bJohn Wiley & Sons Inc.,
_c2018
264 4 _c©2018
300 _axxvi, 758 pages :
_billustrations ;
_c24 cm
500 _aIncludes index.
505 0 _aPart 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.
520 _a"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
650 0 _aComputer networks
_xSecurity measures.
_92355
650 0 _aComputer security.
_92356
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
_92357
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
_92358
700 1 _aGrow, Christopher,
_eauthor.
_92359
700 1 _aCraig, Philip
_c(Engineer),
_eauthor.
_92360
700 1 _aShort, Donald,
_eauthor.
_92361
942 _2lcc
_cBK
999 _c934
_d934