Cybersecurity essentials / (Record no. 19066)

MARC details
000 -LEADER
fixed length control field 01835cam a22002057i 4500
001 - CONTROL NUMBER
control field 20488508
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230504145407.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180508s2018 inua 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119362395 HB
040 ## - CATALOGING SOURCE
Original cataloging agency MMSU
Transcribing agency ULS
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59 C93 2018 AC
245 10 - TITLE STATEMENT
Title Cybersecurity essentials /
Statement of responsibility, etc. Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, Indiana :
Name of publisher, distributor, etc. Sybex,
Date of publication, distribution, etc. 2018.
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 758 pages :
Other physical details illustrations ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 2299
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
          MMSU Main Library MMSU Main Library American Corner 01/01/2023 Donation   TK 5105.59 C93 2018 AC 6014-AC 05/04/2023 05/04/2023 Books

© 2023 Mariano Marcos State University. All Rights Reserved.

Powered by Koha