Principles of Cybersecurity / (Record no. 591)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01429nam a22002177a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Urbe University |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250630134433.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250630b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9798888171837 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | URBE UNIVERSITY |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | L39 2025 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Lavender, Linda K. |
| Relator term | author |
| 245 10 - TITLE STATEMENT | |
| Title | Principles of Cybersecurity / |
| Statement of responsibility, etc | Linda K. Lavender |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | [S.l.], |
| Name of publisher, distributor, etc | GOODHEART-WILLCOX CO, |
| Date of publication, distribution, etc | 2025 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvi, 626 pages ; |
| Other physical details | illustrations (color) , |
| Dimensions | 28 cm |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter 1.- Cybersecurity Basics- Chapter 2.- Information Security Fundamentals.- Chapter 3.- Managing User Security.- Chapter 4.- Protecting and Controlling Physical Environments and Devices.- Chapter 5.- Protecting Host Systems.- Chapter 6.- Security Vulnerabilities and Protection of Nontraditional Hosts.- Chapter 7.- Overview of Network Security and Network Services and Infrastructure from Attacks. Chapter 9 Wireless Network Security.- Chapter 10.- Encryption and Cryptography.-- Chapter 11.- Software Vulnerabilities.- Chapter 12.- Evaluating System Compliance and Integrity.-- Chapter 13.- Cloud Computing.-- Chapter 14.- Risk Management.-- Chapter 15.- Maintaining Operability.-- Chapter 16.- Incident Response and Computer Forensics.-- Chapter 17.- Career and Workplace Considerations. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data protection |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer Security |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer Networks |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Library of Congress Classification |
| Koha item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | URBE Library | URBE Library | 06/30/2025 | Purchase | QA76.9.A25 L39 2025 | 1016 | 06/30/2025 | 06/30/2025 | Books |