| 000 | 02991cam a22003498i 4500 | ||
|---|---|---|---|
| 001 | 21396501 | ||
| 003 | OSt | ||
| 005 | 20240215152121.0 | ||
| 008 | 200123s2020 flu b 001 0 eng | ||
| 010 | _a 2019058631 | ||
| 020 |
_a9780367472504 _q(paperback) |
||
| 020 |
_a9780367476489 _q(hardback) |
||
| 020 |
_z9781003035626 _q(ebook) |
||
| 042 | _apcc | ||
| 082 | 0 | 0 |
_a005.8 _223 |
| 100 | 1 |
_aThakur, Kutub, _eauthor. _9106528 |
|
| 245 | 1 | 0 |
_aCybersecurity fundamentals : _ba real-world perspective / _cby Dr Kutub Thakur, PhD and Dr Al-Sakib Khan Pathan, PhD. |
| 250 | _aFirst edition. | ||
| 263 | _a2010 | ||
| 264 | 1 |
_aBoca Raton, FL : _bCRC Press, _c2020. |
|
| 300 | _app.288 | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a"Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book"-- _cProvided by publisher. |
||
| 650 | 0 |
_aComputer networks _xSecurity measures. _9106529 |
|
| 700 | 1 |
_aPathan, Al-Sakib Khan, _eauthor. _9106530 |
|
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||
| 999 |
_c84117 _d84117 |
||