NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cybersecurity essentials / (Record no. 12548)

MARC details
000 -LEADER
fixed length control field 06002cam a2200793 i 4500
001 - CONTROL NUMBER
control field on1050448121
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125541.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180905s2017 nju o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency N$T
-- DG1
-- NLE
-- YDX
-- OCLCF
-- MNW
-- MERER
-- UAB
-- UPM
-- UKMGB
-- OTZ
-- OCLCQ
-- TEFOD
-- U3W
-- DKU
-- OCLCQ
-- ESU
-- DG1
-- UKAHL
-- OCLCQ
-- OCLCO
-- IEEEE
-- OCLCQ
-- OCLCO
-- OCLCL
-- OCLCQ
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 018469719
Source Uk
019 ## -
-- 1051085280
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119362432
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119362431
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119362456
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119362458
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119369141
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119369142
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119362395
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119362393
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119369141
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000064169926
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 011362171
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 001021108
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 529704250
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier GBVCP
System control number 1048685888
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 018469719
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1050448121
Canceled/invalid control number (OCoLC)1051085280
037 ## - SOURCE OF ACQUISITION
Stock number 9781119362456
Source of stock number/acquisition Wiley
037 ## - SOURCE OF ACQUISITION
Stock number 4F78686D-34A3-4E57-8229-C70057DC19B2
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
037 ## - SOURCE OF ACQUISITION
Stock number 9820804
Source of stock number/acquisition IEEE
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Brooks, Charles J.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity essentials /
Statement of responsibility, etc. Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer Sybex,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (450 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Securing the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (EBSCO, viewed September 6, 2018).
520 8# - SUMMARY, ETC.
Summary, etc. An accessible introduction to cybersecurity concepts and practices, 'Cybersecurity Essentials' provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.
Expansion of summary note An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. Learn security and surveillance fundamentals Secure and protect remote access and devices Understand network topologies, protocols, and strategies Identify threats and mount an effective defenseCybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element R�eseaux d'ordinateurs
General subdivision S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- Networking.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Grow, Christopher,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Craig, Philip,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Short, Donald,
Relator term author.
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Cybersecurity essentials (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCGBBpgmpfxyfwyXYHvjqKm
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781119362395
-- 1119362393
Record control number (OCoLC)1007857746
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH31818719
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH31818718
938 ## -
-- EBSCOhost
-- EBSC
-- 1884075
938 ## -
-- YBP Library Services
-- YANK
-- 15684383
938 ## -
-- YBP Library Services
-- YANK
-- 15695331
938 ## -
-- YBP Library Services
-- YANK
-- 15696066
994 ## -
-- 92
-- INLUM

No items available.