|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1039099672 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
180608s2018 xx 114 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d TOH
|d OCLCF
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000067117439
|
035 |
|
|
|a (OCoLC)1039099672
|
037 |
|
|
|a CL0500000970
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dewey, Gary,
|e speaker.
|
245 |
1 |
0 |
|a Cyber security :
|b endpoint defense /
|c Gary Dewey.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c [2018]
|
300 |
|
|
|a 1 online resource (1 streaming video file (1 hr., 53 min., 9 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Gary Dewey.
|
500 |
|
|
|a Title from title screen (viewed June 7, 2018).
|
500 |
|
|
|a Date of publication from resource description page.
|
520 |
|
|
|a "Computer and network security is very important and relevant in today's business world. Many system administrators and information technology professionals do not have formal training in computer security and may lack the budget to hire security professionals. They need an affordable solution to help them secure their data and improve their security posture. This video course will enable you to close the gap and be well acquainted with basic security fundamentals to improve their security. You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. Finally you will learn how to protect users from malware, phishing, and social engineering attacks and disaster recovery. By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. These topics are relevant to today's Information Technology environment and protection is vital to business success."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781788990981/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|