000 -LEADER |
fixed length control field |
01829cam a2200289Ii 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
jomaaum |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230828131957.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
171027t20182018maua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780357424377 |
|
International Standard Book Number |
0357424379 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.C52 2018 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
C565 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Ciampa, Mark D., |
Relator term |
author |
9 (RLIN) |
45561 |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
CompTIA security+ guide to network security fundamentals / |
Statement of responsibility, etc |
Mark Ciampa |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Computing Technology Industry Association security+ guide to network security fundamentals |
|
Title proper/short title |
Security+ guide to network security fundamentals |
250 ## - EDITION STATEMENT |
Edition statement |
6th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boston [Mass.] |
Name of publisher, distributor, etc |
Cengage Learning, |
Date of publication, distribution, etc |
2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 558p. : |
Other physical details |
ill. (chiefly color) ; |
Dimensions |
28 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1: Security and its threats -- 1. Introduction to security. -- 2. Malware and social engineering attacks. -- Part 2: Cryptography -- 3. Basic cryptography. -- 4. Advanced cryptography and PKI. -- Part 3: Network attacks and defenses. -- 5. Networking and server attacks. -- 6. Network security devices, design and technologies. -- 7. Administering a secure network. -- 8. Wireless network security. -- Part 4: Device security -- 9. Client and application security.10. Mobile and embedded device security. -- Part 5: Identity and access management. -- 11. Authentication and account management -- 12. Access management. -- Part 6: Risk management. -- 13. Vulnerability assessment and data security. -- 14. Business continuity. -- 15. Risk mitigation |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
-- |
Examinations |
Form subdivision |
Study guides |
9 (RLIN) |
202 |
|
Topical term or geographic name as entry element |
Data protection |
655 #7 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Study guides. |
Source of term |
fast |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
Computing Technology Industry Association, |
Relator term |
sponsoring body |
9 (RLIN) |
45562 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Book |