000 03850cam a22004697i 4500
001 20488508
003 OSt
005 20250218103013.0
008 180508s2018 inua 001 0 eng d
010 _a 2018943782
020 _a9781119362395 [newsprint]
040 _aWBT
_beng
_cWBT
_erda
_dOCLCQ
_dOCLCF
_dOCLCO
_dOCLCA
_dBTCTA
_dYDX
_dBDX
_dJRZ
_dJQW
_dBKL
_dNCK
_dPZS
_dDLC
042 _alccopycat
082 0 4 _223
100 1 _aBrooks, Charles J.,
_eauthor.
245 1 0 _aCybersecurity essentials /
_cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
246 3 _aCyber security essentials
260 _aIndianapolis, Indiana :
_bSybex a WileyBrand,
_cc2018.
300 _axxvi, 758 pages :
_billustrations (black and white) ;
_c24 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
500 _aIncludes index.
505 0 _aPart 1. Securing the infrastructure -- Chapter 1 Infrastructure security in the real world -- Chapter 2 Understanding access-control and monitoring systems -- Chapter 3 Understanding video surveillance systems -- Chapter 4 Understanding intrusion-detection and reporting systems -- Chapter 5 Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts -- Chapter 6 Local host security in the real world -- Chapter 7 Securing devices -- Chapter 8 Protecting the inner perimeter -- Chapter 9 Protecting remote access -- Chapter 10 Local host security: review questions and hands-on exercises -- Part 3. Securing local networks -- Chapter 11 Local network security in the real world -- Chapter 12 Networking basics -- Chapter 13 Understanding networking protocols -- Chapter 14 Understanding network servers -- Chapter 15 Understanding network connectivity devices -- Chapter 16 Understanding network transmission media security -- Chapter 17 Local network security: review questions -- Part 4. Securing the perimeter -- Chapter 18 Perimeter security in the real world -- Chapter 19 Understanding the environment -- Chapter 20 Hiding the private network -- Chapter 21 Protecting the perimeter -- Chapter 22 Protecting data moving through the Internet -- Chapter 23 Tools and utilities -- Chapter 24 Identifying and defending against vulnerabilities -- Chapter 25 Perimeter security: review questions and hands-on exercises.
520 _a"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts." -- From publisher's description
521 _aAdult
541 _aPurchased
_xOrtega, Eric
_yCollege of Computer Studies
_zComputer Studies : Information Technology
546 _aText in English
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security.
650 7 _aComputer networks
_xSecurity measures.
_2fast
650 7 _aComputer security.
_2fast
700 1 _aGrow, Christopher,
_eauthor.
700 1 _aCraig, Philip
_c(Engineer),
_eauthor.
700 1 _aShort, Donald,
_eauthor.
906 _a7
_bcbc
_ccopycat
_d2
_eepcn
_f20
_gy-gencatlg
942 _2ddc
_cBK
998 _cJanna [new]
_d02/18/2025
999 _c13209
_d13209