000 | 06002cam a2200793 i 4500 | ||
---|---|---|---|
001 | on1050448121 | ||
003 | OCoLC | ||
005 | 20240523125541.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 180905s2017 nju o 000 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dDG1 _dNLE _dYDX _dOCLCF _dMNW _dMERER _dUAB _dUPM _dUKMGB _dOTZ _dOCLCQ _dTEFOD _dU3W _dDKU _dOCLCQ _dESU _dDG1 _dUKAHL _dOCLCQ _dOCLCO _dIEEEE _dOCLCQ _dOCLCO _dOCLCL _dOCLCQ |
||
016 | 7 |
_a018469719 _2Uk |
|
019 | _a1051085280 | ||
020 |
_a9781119362432 _q(electronic bk.) |
||
020 |
_a1119362431 _q(electronic bk.) |
||
020 |
_a9781119362456 _q(electronic bk.) |
||
020 |
_a1119362458 _q(electronic bk.) |
||
020 |
_a9781119369141 _q(electronic bk. ; _qoBook) |
||
020 |
_a1119369142 _q(electronic bk. ; _qoBook) |
||
020 | _z9781119362395 | ||
020 | _z1119362393 | ||
024 | 7 |
_a10.1002/9781119369141 _2doi |
|
029 | 1 |
_aAU@ _b000064169926 |
|
029 | 1 |
_aCHBIS _b011362171 |
|
029 | 1 |
_aCHNEW _b001021108 |
|
029 | 1 |
_aCHVBK _b529704250 |
|
029 | 1 |
_aGBVCP _b1048685888 |
|
029 | 1 |
_aUKMGB _b018469719 |
|
035 |
_a(OCoLC)1050448121 _z(OCoLC)1051085280 |
||
037 |
_a9781119362456 _bWiley |
||
037 |
_a4F78686D-34A3-4E57-8229-C70057DC19B2 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
037 |
_a9820804 _bIEEE |
||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aBrooks, Charles J., _eauthor. |
|
245 | 1 | 0 |
_aCybersecurity essentials / _cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
264 | 1 |
_aHoboken, NJ : _bSybex, _c2017. |
|
300 | _a1 online resource (450 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aSecuring the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework. | |
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed September 6, 2018). | |
520 | 8 |
_aAn accessible introduction to cybersecurity concepts and practices, 'Cybersecurity Essentials' provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. _bAn accessible introduction to cybersecurity concepts and practicesCybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. Learn security and surveillance fundamentals Secure and protect remote access and devices Understand network topologies, protocols, and strategies Identify threats and mount an effective defenseCybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge. |
|
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures. |
|
650 | 6 | _aS�ecurit�e informatique. | |
650 | 7 |
_aCOMPUTERS _xSecurity _xNetworking. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
700 | 1 |
_aGrow, Christopher, _eauthor. |
|
700 | 1 |
_aCraig, Philip, _eauthor. |
|
700 | 1 |
_aShort, Donald, _eauthor. |
|
758 |
_ihas work: _aCybersecurity essentials (Text) _1https://id.oclc.org/worldcat/entity/E39PCGBBpgmpfxyfwyXYHvjqKm _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _z9781119362395 _z1119362393 _w(OCoLC)1007857746 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141 |
938 |
_aAskews and Holts Library Services _bASKH _nAH31818719 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH31818718 |
||
938 |
_aEBSCOhost _bEBSC _n1884075 |
||
938 |
_aYBP Library Services _bYANK _n15684383 |
||
938 |
_aYBP Library Services _bYANK _n15695331 |
||
938 |
_aYBP Library Services _bYANK _n15696066 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12548 _d12548 |