000 | 03850cam a22004697i 4500 | ||
---|---|---|---|
001 | 20488508 | ||
003 | OSt | ||
005 | 20250218103013.0 | ||
008 | 180508s2018 inua 001 0 eng d | ||
010 | _a 2018943782 | ||
020 | _a9781119362395 [newsprint] | ||
040 |
_aWBT _beng _cWBT _erda _dOCLCQ _dOCLCF _dOCLCO _dOCLCA _dBTCTA _dYDX _dBDX _dJRZ _dJQW _dBKL _dNCK _dPZS _dDLC |
||
042 | _alccopycat | ||
082 | 0 | 4 | _223 |
100 | 1 |
_aBrooks, Charles J., _eauthor. |
|
245 | 1 | 0 |
_aCybersecurity essentials / _cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
246 | 3 | _aCyber security essentials | |
260 |
_aIndianapolis, Indiana : _bSybex a WileyBrand, _cc2018. |
||
300 |
_axxvi, 758 pages : _billustrations (black and white) ; _c24 cm. |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _aunmediated |
||
338 |
_2rdacarrier _avolume |
||
500 | _aIncludes index. | ||
505 | 0 | _aPart 1. Securing the infrastructure -- Chapter 1 Infrastructure security in the real world -- Chapter 2 Understanding access-control and monitoring systems -- Chapter 3 Understanding video surveillance systems -- Chapter 4 Understanding intrusion-detection and reporting systems -- Chapter 5 Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts -- Chapter 6 Local host security in the real world -- Chapter 7 Securing devices -- Chapter 8 Protecting the inner perimeter -- Chapter 9 Protecting remote access -- Chapter 10 Local host security: review questions and hands-on exercises -- Part 3. Securing local networks -- Chapter 11 Local network security in the real world -- Chapter 12 Networking basics -- Chapter 13 Understanding networking protocols -- Chapter 14 Understanding network servers -- Chapter 15 Understanding network connectivity devices -- Chapter 16 Understanding network transmission media security -- Chapter 17 Local network security: review questions -- Part 4. Securing the perimeter -- Chapter 18 Perimeter security in the real world -- Chapter 19 Understanding the environment -- Chapter 20 Hiding the private network -- Chapter 21 Protecting the perimeter -- Chapter 22 Protecting data moving through the Internet -- Chapter 23 Tools and utilities -- Chapter 24 Identifying and defending against vulnerabilities -- Chapter 25 Perimeter security: review questions and hands-on exercises. | |
520 | _a"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts." -- From publisher's description | ||
521 | _aAdult | ||
541 |
_aPurchased _xOrtega, Eric _yCollege of Computer Studies _zComputer Studies : Information Technology |
||
546 | _aText in English | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 7 |
_aComputer networks _xSecurity measures. _2fast |
|
650 | 7 |
_aComputer security. _2fast |
|
700 | 1 |
_aGrow, Christopher, _eauthor. |
|
700 | 1 |
_aCraig, Philip _c(Engineer), _eauthor. |
|
700 | 1 |
_aShort, Donald, _eauthor. |
|
906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
998 |
_cJanna [new] _d02/18/2025 |
||
999 |
_c13209 _d13209 |