000 03741cam a2200517Ki 4500
001 9781003035626
003 FlBoTFG
005 20220711212054.0
006 m o d
007 cr |n|||||||||
008 200511s2020 flu ob 000 0 eng d
040 _aOCoLC-P
_beng
_cOCoLC-P
020 _a9781000059571
_q(electronic bk.)
020 _a100005957X
_q(electronic bk.)
020 _a9781003035626
_q(electronic bk.)
020 _a1003035620
_q(electronic bk.)
020 _a9781000059632
_q(electronic bk. : EPUB)
020 _a1000059634
_q(electronic bk. : EPUB)
020 _a9781000059601
_q(electronic bk. : Mobipocket)
020 _a100005960X
_q(electronic bk. : Mobipocket)
020 _z0367472503
020 _z9780367472504
035 _a(OCoLC)1153272486
_z(OCoLC)1154053436
035 _a(OCoLC-P)1153272486
050 4 _aTK5105.59
072 7 _aEDU
_x039000
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUR
_2bicssc
082 0 4 _a005.8
_223
100 1 _aThakur, Kutub.
_912859
245 1 0 _aCybersecurity fundamentals
_h[electronic resource] :
_ba real-world perspective /
_cDr Kutub Thakur, Dr Al-Sakib Khan Pathan.
250 _aFirst edition.
260 _aBoca Raton, FL :
_bCRC Press,
_c2020.
300 _a1 online resource.
520 _aCybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer networks
_xSecurity measures.
_93969
650 7 _aEDUCATION / Computers & Technology
_2bisacsh
_912860
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
_912816
650 7 _aCOMPUTERS / Security / General
_2bisacsh
_96769
700 1 _aPathan, Al-Sakib Khan.
_912751
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003035626
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _cEBK
999 _c70310
_d70310