| 000 | 03206cam a22003857i 4500 | ||
|---|---|---|---|
| 001 | 20488508 | ||
| 003 | Urbe University | ||
| 005 | 20211028204709.0 | ||
| 008 | 180508s2018 inua 001 0 eng d | ||
| 010 | _a 2018943782 | ||
| 020 |
_a9781119362395 _q(softcover) |
||
| 020 |
_a1119362393 _q(softcover) |
||
| 035 | _a(OCoLC)on1007857746 | ||
| 040 |
_aWBT _beng _cWBT _erda _dOCLCQ _dOCLCF _dOCLCO _dOCLCA _dBTCTA _dYDX _dBDX _dJRZ _dJQW _dBKL _dNCK _dPZS _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aTK5105.59 _b.B766 2018 |
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aBrooks, Charles J., _eauthor. |
|
| 245 | 1 | 0 |
_aCybersecurity essentials / _cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
| 246 | 3 | _aCyber security essentials | |
| 300 |
_axxvi, 758 pages : _billustrations ; _c24 cm |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aPart 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises. | |
| 520 | _a"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aComputer security. | |
| 650 | 7 |
_aComputer networks _xSecurity measures. _2fast |
|
| 650 | 7 |
_aComputer security. _2fast |
|
| 700 | 1 |
_aGrow, Christopher, _eauthor. |
|
| 700 | 1 |
_aCraig, Philip _c(Engineer), _eauthor. |
|
| 700 | 1 |
_aShort, Donald, _eauthor. |
|
| 906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK |
||
| 999 |
_c406 _d406 |
||