|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1105332935 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
190622s2019 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d CHVBK
|d OCLCQ
|d OCLCO
|d YDX
|d OCLCF
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1103217640
|
020 |
|
|
|a 9781789806939
|
020 |
|
|
|a 1789806933
|
029 |
1 |
|
|a CHNEW
|b 001059038
|
029 |
1 |
|
|a CHVBK
|b 569756413
|
029 |
1 |
|
|a AU@
|b 000071377344
|
035 |
|
|
|a (OCoLC)1105332935
|z (OCoLC)1103217640
|
050 |
|
4 |
|a QA76.9.A25
|b .O953 2019
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ozkaya, Erdal.
|
245 |
1 |
0 |
|a Cybersecurity :
|b a Comprehensive Guide to Getting Started in Cybersecurity.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing, Limited,
|c 2019.
|
300 |
|
|
|a 1 online resource (384 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Acknowledment; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Importance of Cybersecurity; The history of data breaches; Scenarios for security; Understanding the attack surface; The threat landscape; The importance of securing the network and applications; The history of breaches; 1984 -- The TRW data breach; 1990s -- Beginning of computer viruses and worms; The years 2000-2010; How security helps to build trust; Summary; Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI; Legacy cybersecurity systems
|
505 |
8 |
|
|a Signature-based security systemsNetwork cyber attacks; Network security tools; Transformations in cybersecurity; Layered security; New security threats; Responses to the new threats; Advancements in security technology to security 2.0; Anomaly-based security systems; How ML and AI will play a larger role in cybersecurity; Summary; Further reading; Chapter 3: Learning Cybersecurity Technologies; Mobile security; Loss or theft; Software-related security issues; Advanced data security; Cloud security; Modern day regulations; Incidence response and forensics; Enterprise security at scale
|
505 |
8 |
|
|a Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts
|
505 |
8 |
|
|a Network security engineersInformation assurance technicians; Data security analysts; IT security compliance analysts; System security specialists; Skills to acquire in cybersecurity; Foundation skills; Risk management; Networking; Situational awareness; Toolkits; Security analyst skills; Threat assessment; Vulnerability assessment; Log collection and analysis; Active analysis; Incidence response; Disaster recovery; Forensics; Penetration testing skills; Intelligence gathering; Incidence reporting; Restraint; Security architecture skills; Identity and access management; Network configuration
|
505 |
8 |
|
|a System hardeningChoosing skills to pick up based on current professional experience and skills; Ethical hacking skills; Application security skills; Cloud security skills; DevSecOps skills; Threat and vulnerability assessment skills; Information security management skills; Cybersecurity litigation support skills; Regulatory compliance and auditing skills; Summary; Further reading; Chapter 5: Attacker Mindset; The category of hackers; The traits of hackers; They are patient; They are determined; They are insensitive; They are risk-takers; They are careful; They are deviant
|
500 |
|
|
|a Social characteristics of hackers
|
520 |
|
|
|a Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
758 |
|
|
|i has work:
|a Cybersecurity (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFGHyd3kxRcTd4q9BMYvBP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Ozkaya, Erdal.
|t Cybersecurity: the Beginner's Guide.
|d Birmingham : Packt Publishing, Limited, ©2019
|z 9781789616194
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5781046
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5781046
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300569078
|
994 |
|
|
|a 92
|b IZTAP
|