//]]>

Cybersecurity fundamentals : (Record no. 35385)

000 -LEADER
fixed length control field 02577cam a22002298i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220513105243.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200123s2020 flu b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367472504
International Standard Book Number 9780367476489
Cancelled/invalid ISBN 9781003035626
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .T497 2020
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number T364
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Thakur, Kutub,
Relator term author.
9 (RLIN) 44987
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Cybersecurity fundamentals :
Remainder of title a real-world perspective /
Statement of responsibility, etc by Kutub Thakur, Al-Sakib Khan Pathan .
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton, FL :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2020.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 288 p. :
Dimensions 24 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pathan, Al-Sakib Khan,
Relator term author.
9 (RLIN) 44988
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Lost status Withdrawn status Source of acquisition Cost, replacement price Damaged status Barcode Shelving location Current location Public note Full call number
2022-05-13AUM Main Library2022-05-13 2022-05-13 Book  UBCC56.90 AUM-025093English Collections HallAUM Main Libraryinvoice 2021/1472005.8 T364
2022-05-13AUM Main Library2022-05-13 2022-05-13 Book  UBCC56.90 AUM-025094English Collections HallAUM Main Libraryinvoice 2022/0068005.8 T364