Cybersecurity essentials / (Record no. 19066)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01835cam a22002057i 4500 |
001 - CONTROL NUMBER | |
control field | 20488508 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230504145407.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180508s2018 inua 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119362395 HB |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MMSU |
Transcribing agency | ULS |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK 5105.59 C93 2018 AC |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity essentials / |
Statement of responsibility, etc. | Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Indianapolis, Indiana : |
Name of publisher, distributor, etc. | Sybex, |
Date of publication, distribution, etc. | 2018. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvi, 758 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
9 (RLIN) | 2299 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
MMSU Main Library | MMSU Main Library | American Corner | 01/01/2023 | Donation | TK 5105.59 C93 2018 AC | 6014-AC | 05/04/2023 | 05/04/2023 | Books |