000 -LEADER |
fixed length control field |
02577cam a22002298i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220513105243.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200123s2020 flu b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367472504 |
|
International Standard Book Number |
9780367476489 |
|
Cancelled/invalid ISBN |
9781003035626 |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.T497 2020 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
T364 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Thakur, Kutub, |
Relator term |
author. |
9 (RLIN) |
44987 |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Cybersecurity fundamentals : |
Remainder of title |
a real-world perspective / |
Statement of responsibility, etc |
by Kutub Thakur, Al-Sakib Khan Pathan . |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton, FL : |
Name of publisher, distributor, etc |
CRC Press, |
Date of publication, distribution, etc |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 288 p. : |
Dimensions |
24 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Pathan, Al-Sakib Khan, |
Relator term |
author. |
9 (RLIN) |
44988 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Book |