Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
Description: xxvi, 758 pages : illustrations ; 24 cmISBN:- 9781119362395
- 1119362393
- Cyber security essentials
- 005.8 23
- TK5105.59 .B766 2018
| Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
URBE Library General Stacks | Non-fiction | TK5105.59 .B766 2018 C.2 (Browse shelf(Opens below)) | 2 | Available | 0773 | |
Books
|
URBE Library General Stacks | Non-fiction | TK5105.59 .B766 2018 C.1 (Browse shelf(Opens below)) | 1 | Available | 0768 |
Browsing URBE Library shelves,Shelving location: General Stacks,Collection: Non-fiction Close shelf browser (Hides shelf browser)
|
|
|
|
No cover image available No cover image available | No cover image available No cover image available |
|
||
| TK5105.5 D439 2013 Network+ guide to networks / | TK5105.55 .S95 2014 Switched networks companion guide / | TK5105.59 .B766 2018 C.1 Cybersecurity essentials / | TK5105.59 .B766 2018 C.2 Cybersecurity essentials / | TK5105.59 .C76 2021 C.1 Ciberseguridad para Ejecutivos / | TK5105.59 .C76 2021 C.2 Ciberseguridad para Ejecutivos / | TK 5105.59 W54 2017 Copy 1 Management of information security / |
Includes index.
Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.
"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
There are no comments on this title.