Cybersecurity fundamentals (Record no. 70310)

000 -LEADER
fixed length control field 03741cam a2200517Ki 4500
001 - CONTROL NUMBER
control field 9781003035626
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212054.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200511s2020 flu ob 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000059571
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 100005957X
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781003035626
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1003035620
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000059632
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000059634
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000059601
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 100005960X
-- (electronic bk. : Mobipocket)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Thakur, Kutub.
245 10 - TITLE STATEMENT
Title Cybersecurity fundamentals
Sub Title a real-world perspective /
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton, FL :
Publisher CRC Press,
Year of publication 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource.
520 ## - SUMMARY, ETC.
Summary, etc Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Pathan, Al-Sakib Khan.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781003035626
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- EDUCATION / Computers & Technology
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Networking / Security
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Security / General

No items available.