Cybersecurity essentials / (Record no. 68427)

000 -LEADER
fixed length control field 03376cam a2200625Ii 4500
001 - CONTROL NUMBER
control field on1050448121
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203206.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180905s2017 nju o 000 0 eng d
019 ## -
-- 1051085280
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119362432
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119362431
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119362456
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119362458
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119369141
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119369142
-- (electronic bk. : oBook)
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 529704250
029 1# - (OCLC)
OCLC library identifier CHNEW
System control number 001021108
029 1# - (OCLC)
OCLC library identifier UKMGB
System control number 018469719
037 ## -
-- 9781119362456
-- Wiley
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Brooks, Charles J.,
245 00 - TITLE STATEMENT
Title Cybersecurity essentials /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (450 pages)
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Securing the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Grow, Christopher,
700 1# - AUTHOR 2
Author 2 Craig, Philip,
700 1# - AUTHOR 2
Author 2 Short, Donald,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119369141
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, NJ :
-- Sybex,
-- 2017.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 0# -
-- Online resource; title from PDF title page (EBSCO, viewed September 6, 2018)
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Security / Networking.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
-- (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
-- (OCoLC)fst00872484
994 ## -
-- 92
-- DG1

No items available.