Cybersecurity fundamentals : (Record no. 84117)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02991cam a22003498i 4500 |
| 001 - CONTROL NUMBER | |
| control field | 21396501 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20240215152121.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 200123s2020 flu b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2019058631 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780367472504 |
| Qualifying information | (paperback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780367476489 |
| Qualifying information | (hardback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781003035626 |
| Qualifying information | (ebook) |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Thakur, Kutub, |
| Relator term | author. |
| 9 (RLIN) | 106528 |
| 245 10 - TITLE STATEMENT | |
| Title | Cybersecurity fundamentals : |
| Remainder of title | a real-world perspective / |
| Statement of responsibility, etc. | by Dr Kutub Thakur, PhD and Dr Al-Sakib Khan Pathan, PhD. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | First edition. |
| 263 ## - PROJECTED PUBLICATION DATE | |
| Projected publication date | 2010 |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Place of production, publication, distribution, manufacture | Boca Raton, FL : |
| Name of producer, publisher, distributor, manufacturer | CRC Press, |
| Date of production, publication, distribution, manufacture, or copyright notice | 2020. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | pp.288 |
| 336 ## - CONTENT TYPE | |
| Content type term | text |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type term | unmediated |
| Media type code | n |
| Source | rdamedia |
| 338 ## - CARRIER TYPE | |
| Carrier type term | volume |
| Carrier type code | nc |
| Source | rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | "Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book"-- |
| Assigning source | Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 106529 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Pathan, Al-Sakib Khan, |
| Relator term | author. |
| 9 (RLIN) | 106530 |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 7 |
| b | cbc |
| c | orignew |
| d | 1 |
| e | ecip |
| f | 20 |
| g | y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Vendor | Cost, normal purchase price | Bill number | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Discount | Cost, replacement price | Bill Date | Koha item type | Original Barcode |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | BCA | MKSSS s K.B. Joshi Institute of Information Technology Library | MKSSS s K.B. Joshi Institute of Information Technology Library | 07/11/2022 | Vaibhav Book House,Pune | 5499.00 | 615 | 8 | 005.8 | KBJP-BK-2374 | 03/01/2025 | 18/12/2024 | 22% | 7050.00 | 07/11/2022 | Books | 2374 |