000 | 03376cam a2200625Ii 4500 | ||
---|---|---|---|
001 | on1050448121 | ||
003 | OCoLC | ||
005 | 20220711203206.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 180905s2017 nju o 000 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dDG1 _dNLE _dYDX _dOCLCF _dMNW _dMERER _dUAB _dUPM _dUKMGB _dOTZ _dOCLCQ |
||
015 |
_aGBB7E5888 _2bnb |
||
016 | 7 |
_a018469719 _2Uk |
|
019 | _a1051085280 | ||
020 |
_a9781119362432 _q(electronic bk.) |
||
020 |
_a1119362431 _q(electronic bk.) |
||
020 |
_a9781119362456 _q(electronic bk.) |
||
020 |
_a1119362458 _q(electronic bk.) |
||
020 |
_a9781119369141 _q(electronic bk. : oBook) |
||
020 |
_a1119369142 _q(electronic bk. : oBook) |
||
020 | _z9781119362395 | ||
020 | _z1119362393 | ||
029 | 1 |
_aCHVBK _b529704250 |
|
029 | 1 |
_aCHNEW _b001021108 |
|
029 | 1 |
_aUKMGB _b018469719 |
|
035 |
_a(OCoLC)1050448121 _z(OCoLC)1051085280 |
||
037 |
_a9781119362456 _bWiley |
||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aBrooks, Charles J., _eauthor. _95158 |
|
245 | 0 | 0 |
_aCybersecurity essentials / _cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
264 | 1 |
_aHoboken, NJ : _bSybex, _c2017. |
|
300 | _a1 online resource (450 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aSecuring the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework. | |
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed September 6, 2018) | |
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 7 |
_aCOMPUTERS / Security / Networking. _2bisacsh _95159 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 _93969 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _93970 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aGrow, Christopher, _eauthor. _95160 |
|
700 | 1 |
_aCraig, Philip, _eauthor. _95161 |
|
700 | 1 |
_aShort, Donald, _eauthor. _95162 |
|
776 | 0 | 8 |
_cOriginal _z9781119362395 _z1119362393 _w(OCoLC)1007857746 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119369141 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c68427 _d68427 |