Normal view MARC view ISBD view

Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.

By: Brooks, Charles J [author.].
Contributor(s): Grow, Christopher [author.] | Craig, Philip [author.] | Short, Donald [author.].
Material type: materialTypeLabelBookPublisher: Hoboken, NJ : Sybex, 2017Description: 1 online resource (450 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781119362432; 1119362431; 9781119362456; 1119362458; 9781119369141; 1119369142.Subject(s): Computer networks -- Security measures | Computer security | COMPUTERS / Security / Networking | Computer networks -- Security measures | Computer securityGenre/Form: Electronic books.Additional physical formats: No titleDDC classification: 005.8 Online resources: Wiley Online Library
Contents:
Securing the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework.
    average rating: 0.0 (0 votes)
No physical items for this record

Securing the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework.

Online resource; title from PDF title page (EBSCO, viewed September 6, 2018)

There are no comments for this item.

Log in to your account to post a comment.