Principles of Cybersecurity / Linda K. Lavender
Publication details: [S.l.], GOODHEART-WILLCOX CO, 2025Description: xvi, 626 pages ; illustrations (color) , 28 cmISBN:- 9798888171837
- QA76.9.A25 L39 2025
| Item type | Current library | Call number | Status | Barcode | |
|---|---|---|---|---|---|
Books
|
URBE Library | QA76.9.A25 L39 2025 (Browse shelf(Opens below)) | Available | 1016 |
Browsing URBE Library shelves Close shelf browser (Hides shelf browser)
|
|
|
No cover image available No cover image available |
|
|
|
||
| QA76.76.O63 S5945 2013 A practical guide to Fedora and Red Hat Enterprise Linux / | QA76.9.A25 C93 2011 C.1 Cyber security essentials / | QA76.9.A25 C93 2011 C.2 Cyber security essentials / | QA76.9.A25 L39 2025 Principles of Cybersecurity / | QA76.9.D3 S5637 2020 Database system concepts / | QA76.9.D314 M54 2015 Copy 1 Protección de datos y seguridad de la información : | QA76.9.D314 M54 2015 Copy 2 Protección de datos y seguridad de la información : |
Chapter 1.- Cybersecurity Basics- Chapter 2.- Information Security Fundamentals.- Chapter 3.- Managing User Security.- Chapter 4.- Protecting and Controlling Physical Environments and Devices.- Chapter 5.- Protecting Host Systems.- Chapter 6.- Security Vulnerabilities and Protection of Nontraditional Hosts.- Chapter 7.- Overview of Network Security and Network Services and Infrastructure from Attacks. Chapter 9 Wireless Network Security.- Chapter 10.- Encryption and Cryptography.-- Chapter 11.- Software Vulnerabilities.- Chapter 12.- Evaluating System Compliance and Integrity.-- Chapter 13.- Cloud Computing.-- Chapter 14.- Risk Management.-- Chapter 15.- Maintaining Operability.-- Chapter 16.- Incident Response and Computer Forensics.-- Chapter 17.- Career and Workplace Considerations.
There are no comments on this title.