Cybersecurity essentials / (Record no. 406)

MARC details
000 -LEADER
fixed length control field 03206cam a22003857i 4500
001 - CONTROL NUMBER
control field 20488508
003 - CONTROL NUMBER IDENTIFIER
control field Urbe University
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20211028204709.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180508s2018 inua 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2018943782
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119362395
Qualifying information (softcover)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119362393
Qualifying information (softcover)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)on1007857746
040 ## - CATALOGING SOURCE
Original cataloging agency WBT
Language of cataloging eng
Transcribing agency WBT
Description conventions rda
Modifying agency OCLCQ
-- OCLCF
-- OCLCO
-- OCLCA
-- BTCTA
-- YDX
-- BDX
-- JRZ
-- JQW
-- BKL
-- NCK
-- PZS
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .B766 2018
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Brooks, Charles J.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity essentials /
Statement of responsibility, etc Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
246 3# - VARYING FORM OF TITLE
Title proper/short title Cyber security essentials
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 758 pages :
Other physical details illustrations ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.
520 ## - SUMMARY, ETC.
Summary, etc "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Grow, Christopher,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Craig, Philip
Titles and other words associated with a name (Engineer),
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Short, Donald,
Relator term author.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Non-fiction URBE Library URBE Library General Stacks 10/28/2021 PURCHASE   TK5105.59 .B766 2018 C.1 0768 10/28/2021 1 10/28/2021 Books
    Library of Congress Classification     Non-fiction URBE Library URBE Library General Stacks 11/01/2021 PURCHASE   TK5105.59 .B766 2018 C.2 0773 11/01/2021 2 11/01/2021 Books

Actively maintained by Library Center and EdTech Departments at URBE University