Cybersecurity fundamentals : (Record no. 84117)

MARC details
000 -LEADER
fixed length control field 02991cam a22003498i 4500
001 - CONTROL NUMBER
control field 21396501
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240215152121.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200123s2020 flu b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019058631
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367472504
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367476489
Qualifying information (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781003035626
Qualifying information (ebook)
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Thakur, Kutub,
Relator term author.
9 (RLIN) 106528
245 10 - TITLE STATEMENT
Title Cybersecurity fundamentals :
Remainder of title a real-world perspective /
Statement of responsibility, etc. by Dr Kutub Thakur, PhD and Dr Al-Sakib Khan Pathan, PhD.
250 ## - EDITION STATEMENT
Edition statement First edition.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2010
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, FL :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent pp.288
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 106529
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pathan, Al-Sakib Khan,
Relator term author.
9 (RLIN) 106530
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Vendor Cost, normal purchase price Bill number Total Checkouts Full call number Barcode Date last seen Date last checked out Discount Cost, replacement price Bill Date Koha item type Original Barcode
    Dewey Decimal Classification     BCA MKSSS s K.B. Joshi Institute of Information Technology Library MKSSS s K.B. Joshi Institute of Information Technology Library 07/11/2022 Vaibhav Book House,Pune 5499.00 615 8 005.8 KBJP-BK-2374 03/01/2025 18/12/2024 22% 7050.00 07/11/2022 Books 2374