//]]>

CompTIA security+ guide to network security fundamentals / (Record no. 35614)

000 -LEADER
fixed length control field 01829cam a2200289Ii 4500
003 - CONTROL NUMBER IDENTIFIER
control field jomaaum
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230828131957.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 171027t20182018maua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780357424377
International Standard Book Number 0357424379
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .C52 2018
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number C565
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ciampa, Mark D.,
Relator term author
9 (RLIN) 45561
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title CompTIA security+ guide to network security fundamentals /
Statement of responsibility, etc Mark Ciampa
246 3# - VARYING FORM OF TITLE
Title proper/short title Computing Technology Industry Association security+ guide to network security fundamentals
Title proper/short title Security+ guide to network security fundamentals
250 ## - EDITION STATEMENT
Edition statement 6th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston [Mass.]
Name of publisher, distributor, etc Cengage Learning,
Date of publication, distribution, etc 2022.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 558p. :
Other physical details ill. (chiefly color) ;
Dimensions 28 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1: Security and its threats -- 1. Introduction to security. -- 2. Malware and social engineering attacks. -- Part 2: Cryptography -- 3. Basic cryptography. -- 4. Advanced cryptography and PKI. -- Part 3: Network attacks and defenses. -- 5. Networking and server attacks. -- 6. Network security devices, design and technologies. -- 7. Administering a secure network. -- 8. Wireless network security. -- Part 4: Device security -- 9. Client and application security.10. Mobile and embedded device security. -- Part 5: Identity and access management. -- 11. Authentication and account management -- 12. Access management. -- Part 6: Risk management. -- 13. Vulnerability assessment and data security. -- 14. Business continuity. -- 15. Risk mitigation
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Examinations
Form subdivision Study guides
9 (RLIN) 202
Topical term or geographic name as entry element Data protection
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Study guides.
Source of term fast
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Computing Technology Industry Association,
Relator term sponsoring body
9 (RLIN) 45562
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Lost status Withdrawn status Source of acquisition Cost, replacement price Damaged status Barcode Shelving location Current location Public note Full call number
2023-08-28AUM Main Library2023-08-28 2023-08-28 Book  UBCC55.90 AUM-025998English Collections HallAUM Main Libraryinv 2023/0174005.8 C565

Languages: 
English |
العربية