MARC details
000 -LEADER |
fixed length control field |
03423cam a22004577i 4500 |
001 - CONTROL NUMBER |
control field |
20488508 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
PCN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20211129192125.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180508s2018 inua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2018943782 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119362395 |
Qualifying information |
(softcover) |
|
International Standard Book Number |
1119362393 |
Qualifying information |
(paperback) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)on1007857746 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
WBT |
Language of cataloging |
eng |
Transcribing agency |
WBT |
Description conventions |
rda |
Modifying agency |
OCLCQ |
-- |
OCLCF |
-- |
OCLCO |
-- |
OCLCA |
-- |
BTCTA |
-- |
YDX |
-- |
BDX |
-- |
JRZ |
-- |
JQW |
-- |
BKL |
-- |
NCK |
-- |
PZS |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.B766 2018 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Brooks, Charles J., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity essentials / |
Statement of responsibility, etc. |
Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Cyber security essentials |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Indianapolis, Indiana : |
Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons Inc., |
Date of production, publication, distribution, manufacture, or copyright notice |
[2018] |
|
Date of production, publication, distribution, manufacture, or copyright notice |
©2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvi, 758 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
|
Content type term |
still image |
Content type code |
sti |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
|
Topical term or geographic name entry element |
Computers |
|
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
|
Topical term or geographic name entry element |
Computer security. |
Source of heading or term |
fast |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Grow, Christopher, |
Relator term |
author. |
|
Personal name |
Craig, Philip |
Titles and other words associated with a name |
(Engineer), |
Relator term |
author. |
|
Personal name |
Short, Donald, |
Relator term |
author. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
ACADEMIC |