000 03376cam a2200625Ii 4500
001 on1050448121
003 OCoLC
005 20220711203206.0
006 m o d
007 cr cnu---unuuu
008 180905s2017 nju o 000 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dDG1
_dNLE
_dYDX
_dOCLCF
_dMNW
_dMERER
_dUAB
_dUPM
_dUKMGB
_dOTZ
_dOCLCQ
015 _aGBB7E5888
_2bnb
016 7 _a018469719
_2Uk
019 _a1051085280
020 _a9781119362432
_q(electronic bk.)
020 _a1119362431
_q(electronic bk.)
020 _a9781119362456
_q(electronic bk.)
020 _a1119362458
_q(electronic bk.)
020 _a9781119369141
_q(electronic bk. : oBook)
020 _a1119369142
_q(electronic bk. : oBook)
020 _z9781119362395
020 _z1119362393
029 1 _aCHVBK
_b529704250
029 1 _aCHNEW
_b001021108
029 1 _aUKMGB
_b018469719
035 _a(OCoLC)1050448121
_z(OCoLC)1051085280
037 _a9781119362456
_bWiley
050 4 _aTK5105.59
072 7 _aCOM
_x043050
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aBrooks, Charles J.,
_eauthor.
_95158
245 0 0 _aCybersecurity essentials /
_cCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
264 1 _aHoboken, NJ :
_bSybex,
_c2017.
300 _a1 online resource (450 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aSecuring the Infrastructure. Infrastructure Security in the Real World -- Understanding Access-Control and Monitoring Systems -- Understanding Video Surveillance Systems -- Understanding Intrusion-Detection and Reporting Systems -- Infrastructure Security -- Securing Local Hosts. Local Host Security in the Real World -- Securing Devices -- Protecting the Inner Perimeter -- Protecting Remote Access -- Local Host Security -- Securing Local Networks. Local Network Security in the Real World -- Networking Basics -- Understanding Networking Protocols -- Understanding Network Servers -- Understanding Network Connectivity Devices -- Understanding Network Transmission Media Security -- Local Network Security -- Securing the Perimeter. Perimeter Security in the Real World -- Understanding the Environment -- Hiding the Private Network -- Protecting the Perimeter -- Protecting Data Moving Through the Internet -- Tools and Utilities -- Identifying and Defending Against Vulnerabilities -- Perimeter Security -- Appendix A: Glossary -- Appendix B: Acronyms -- Appendix C: NIST Preliminary Cybersecurity Framework.
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed September 6, 2018)
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aComputer security.
_93970
650 7 _aCOMPUTERS / Security / Networking.
_2bisacsh
_95159
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
_93969
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
_93970
655 4 _aElectronic books.
_93294
700 1 _aGrow, Christopher,
_eauthor.
_95160
700 1 _aCraig, Philip,
_eauthor.
_95161
700 1 _aShort, Donald,
_eauthor.
_95162
776 0 8 _cOriginal
_z9781119362395
_z1119362393
_w(OCoLC)1007857746
856 4 0 _uhttps://doi.org/10.1002/9781119369141
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c68427
_d68427