000 06002cam a2200793 i 4500
001 on1050448121
003 OCoLC
005 20240523125541.0
006 m o d
007 cr cnu---unuuu
008 180905s2017 nju o 000 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dDG1
_dNLE
_dYDX
_dOCLCF
_dMNW
_dMERER
_dUAB
_dUPM
_dUKMGB
_dOTZ
_dOCLCQ
_dTEFOD
_dU3W
_dDKU
_dOCLCQ
_dESU
_dDG1
_dUKAHL
_dOCLCQ
_dOCLCO
_dIEEEE
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
016 7 _a018469719
_2Uk
019 _a1051085280
020 _a9781119362432
_q(electronic bk.)
020 _a1119362431
_q(electronic bk.)
020 _a9781119362456
_q(electronic bk.)
020 _a1119362458
_q(electronic bk.)
020 _a9781119369141
_q(electronic bk. ;
_qoBook)
020 _a1119369142
_q(electronic bk. ;
_qoBook)
020 _z9781119362395
020 _z1119362393
024 7 _a10.1002/9781119369141
_2doi
029 1 _aAU@
_b000064169926
029 1 _aCHBIS
_b011362171
029 1 _aCHNEW
_b001021108
029 1 _aCHVBK
_b529704250
029 1 _aGBVCP
_b1048685888
029 1 _aUKMGB
_b018469719
035 _a(OCoLC)1050448121
_z(OCoLC)1051085280
037 _a9781119362456
_bWiley
037 _a4F78686D-34A3-4E57-8229-C70057DC19B2
_bOverDrive, Inc.
_nhttp://www.overdrive.com
037 _a9820804
_bIEEE
050 4 _aTK5105.59
072 7 _aCOM
_x043050
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aBrooks, Charles J.,
_eauthor.
245 1 0 _aCybersecurity essentials /
_cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
264 1 _aHoboken, NJ :
_bSybex,
_c2017.
300 _a1 online resource (450 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aSecuring the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework.
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed September 6, 2018).
520 8 _aAn accessible introduction to cybersecurity concepts and practices, 'Cybersecurity Essentials' provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.
_bAn accessible introduction to cybersecurity concepts and practicesCybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. Learn security and surveillance fundamentals Secure and protect remote access and devices Understand network topologies, protocols, and strategies Identify threats and mount an effective defenseCybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 6 _aS�ecurit�e informatique.
650 7 _aCOMPUTERS
_xSecurity
_xNetworking.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
700 1 _aGrow, Christopher,
_eauthor.
700 1 _aCraig, Philip,
_eauthor.
700 1 _aShort, Donald,
_eauthor.
758 _ihas work:
_aCybersecurity essentials (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGBBpgmpfxyfwyXYHvjqKm
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_z9781119362395
_z1119362393
_w(OCoLC)1007857746
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141
938 _aAskews and Holts Library Services
_bASKH
_nAH31818719
938 _aAskews and Holts Library Services
_bASKH
_nAH31818718
938 _aEBSCOhost
_bEBSC
_n1884075
938 _aYBP Library Services
_bYANK
_n15684383
938 _aYBP Library Services
_bYANK
_n15695331
938 _aYBP Library Services
_bYANK
_n15696066
994 _a92
_bINLUM
999 _c12548
_d12548