Cybersecurity essentials / (Record no. 12548)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06002cam a2200793 i 4500 |
001 - CONTROL NUMBER | |
control field | on1050448121 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125541.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180905s2017 nju o 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | N$T |
-- | DG1 |
-- | NLE |
-- | YDX |
-- | OCLCF |
-- | MNW |
-- | MERER |
-- | UAB |
-- | UPM |
-- | UKMGB |
-- | OTZ |
-- | OCLCQ |
-- | TEFOD |
-- | U3W |
-- | DKU |
-- | OCLCQ |
-- | ESU |
-- | DG1 |
-- | UKAHL |
-- | OCLCQ |
-- | OCLCO |
-- | IEEEE |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCL |
-- | OCLCQ |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 018469719 |
Source | Uk |
019 ## - | |
-- | 1051085280 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119362432 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119362431 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119362456 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119362458 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119369141 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119369142 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119362395 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119362393 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119369141 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000064169926 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHBIS |
System control number | 011362171 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 001021108 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 529704250 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | GBVCP |
System control number | 1048685888 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 018469719 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1050448121 |
Canceled/invalid control number | (OCoLC)1051085280 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9781119362456 |
Source of stock number/acquisition | Wiley |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 4F78686D-34A3-4E57-8229-C70057DC19B2 |
Source of stock number/acquisition | OverDrive, Inc. |
Note | http://www.overdrive.com |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9820804 |
Source of stock number/acquisition | IEEE |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Brooks, Charles J., |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity essentials / |
Statement of responsibility, etc. | Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, NJ : |
Name of producer, publisher, distributor, manufacturer | Sybex, |
Date of production, publication, distribution, manufacture, or copyright notice | 2017. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (450 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Securing the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from PDF title page (EBSCO, viewed September 6, 2018). |
520 8# - SUMMARY, ETC. | |
Summary, etc. | An accessible introduction to cybersecurity concepts and practices, 'Cybersecurity Essentials' provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. |
Expansion of summary note | An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. Learn security and surveillance fundamentals Secure and protect remote access and devices Understand network topologies, protocols, and strategies Identify threats and mount an effective defenseCybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | R�eseaux d'ordinateurs |
General subdivision | S�ecurit�e |
-- | Mesures. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | S�ecurit�e informatique. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | Networking. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Source of heading or term | fast |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Grow, Christopher, |
Relator term | author. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Craig, Philip, |
Relator term | author. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Short, Donald, |
Relator term | author. |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Cybersecurity essentials (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCGBBpgmpfxyfwyXYHvjqKm |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 9781119362395 |
-- | 1119362393 |
Record control number | (OCoLC)1007857746 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH31818719 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH31818718 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 1884075 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 15684383 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 15695331 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 15696066 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.