Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
Material type:
- text
- computer
- online resource
- 9781119362432
- 1119362431
- 9781119362456
- 1119362458
- 9781119369141
- 1119369142
- 005.8 23
- TK5105.59
Securing the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework.
Online resource; title from PDF title page (EBSCO, viewed September 6, 2018).
An accessible introduction to cybersecurity concepts and practices, 'Cybersecurity Essentials' provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. Learn security and surveillance fundamentals Secure and protect remote access and devices Understand network topologies, protocols, and strategies Identify threats and mount an effective defenseCybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge.
John Wiley and Sons Wiley Online Library: Complete oBooks
There are no comments on this title.