Welcome to Francis Light Library | francislightlibrary@peninsulamalaysia.edu.my | +604-545 600 EXt:8004
Image from Google Jackets

Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.

By: Contributor(s): Publisher: Indianapolis, Indiana : John Wiley & Sons Inc., [2018]Copyright date: ©2018Description: xxvi, 758 pages : illustrations ; 24 cmContent type:
  • text
  • still image
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119362395
  • 1119362393
Other title:
  • Cyber security essentials
Subject(s): DDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59 .B766 2018
Contents:
Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.
Summary: "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
List(s) this item appears in: Newest Publication
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number URL Copy number Status Date due Barcode Course reserves
BOOK GPS BOOK GPS FRANCIS LIGHT LIBRARY Link to resource Not for loan
ACADEMIC ACADEMIC FRANCIS LIGHT LIBRARY SHELVES 1 005.8 BRO (Browse shelf(Opens below)) 1 Available 00000684

Bsc (Hons) Cyber Security

ACADEMIC ACADEMIC FRANCIS LIGHT LIBRARY SHELVES 1 005.8 BRO (Browse shelf(Opens below)) 2 Available 00000685

Bsc (Hons) Cyber Security

Includes index.

Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.

"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.

There are no comments on this title.

to post a comment.

The Ship Campus, No.1 Education Boulevard,One Auto Hub, Batu Kawan Industrial Park,14110, Bandar Cassia, Penang,Malaysia.Phone: +604 585 5000 Fax: +604 585 5009 | Email: noorshahidah@penisulacollege.edu.my 

Powered by KOHA |© Maintained by WISERF