000 -LEADER |
fixed length control field |
03850cam a22004697i 4500 |
001 - CONTROL NUMBER |
control field |
20488508 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250218103013.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180508s2018 inua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2018943782 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119362395 [newsprint] |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
WBT |
Language of cataloging |
eng |
Transcribing agency |
WBT |
Description conventions |
rda |
Modifying agency |
OCLCQ |
-- |
OCLCF |
-- |
OCLCO |
-- |
OCLCA |
-- |
BTCTA |
-- |
YDX |
-- |
BDX |
-- |
JRZ |
-- |
JQW |
-- |
BKL |
-- |
NCK |
-- |
PZS |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Brooks, Charles J., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity essentials / |
Statement of responsibility, etc |
Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Cyber security essentials |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Indianapolis, Indiana : |
Name of publisher, distributor, etc |
Sybex a WileyBrand, |
Date of publication, distribution, etc |
c2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvi, 758 pages : |
Other physical details |
illustrations (black and white) ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type |
volume |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1. Securing the infrastructure -- Chapter 1 Infrastructure security in the real world -- Chapter 2 Understanding access-control and monitoring systems -- Chapter 3 Understanding video surveillance systems -- Chapter 4 Understanding intrusion-detection and reporting systems -- Chapter 5 Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts -- Chapter 6 Local host security in the real world -- Chapter 7 Securing devices -- Chapter 8 Protecting the inner perimeter -- Chapter 9 Protecting remote access -- Chapter 10 Local host security: review questions and hands-on exercises -- Part 3. Securing local networks -- Chapter 11 Local network security in the real world -- Chapter 12 Networking basics -- Chapter 13 Understanding networking protocols -- Chapter 14 Understanding network servers -- Chapter 15 Understanding network connectivity devices -- Chapter 16 Understanding network transmission media security -- Chapter 17 Local network security: review questions -- Part 4. Securing the perimeter -- Chapter 18 Perimeter security in the real world -- Chapter 19 Understanding the environment -- Chapter 20 Hiding the private network -- Chapter 21 Protecting the perimeter -- Chapter 22 Protecting data moving through the Internet -- Chapter 23 Tools and utilities -- Chapter 24 Identifying and defending against vulnerabilities -- Chapter 25 Perimeter security: review questions and hands-on exercises. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts." -- From publisher's description |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
Adult |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Source of acquisition |
Purchased |
Deans/Chairperson |
Ortega, Eric |
Department |
College of Computer Studies |
Subject Category |
Computer Studies : Information Technology |
546 ## - LANGUAGE NOTE |
Language note |
Text in English |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Source of heading or term |
fast |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Grow, Christopher, |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Craig, Philip |
Titles and other words associated with a name |
(Engineer), |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Short, Donald, |
Relator term |
author. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Type of record |
Book |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Encoded by |
Janna [new] |
Date encoded |
02/18/2025 |