|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1128107243 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
191120s2018 inua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d CHK
|d YWS
|d OCLCO
|
020 |
|
|
|a 9781119362456
|
020 |
|
|
|a 1119362458
|
020 |
|
|
|z 9781119362395
|
035 |
|
|
|a (OCoLC)1128107243
|
037 |
|
|
|a CL0501000084
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Brooks, Charles J.,
|e author.
|
245 |
1 |
0 |
|a Cybersecurity essentials /
|c Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
|
246 |
3 |
|
|a Cyber security essentials
|
264 |
|
1 |
|a Indianapolis, Indiana :
|b Sybex a Wiley brand,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed November 18, 2019).
|
520 |
|
|
|a "Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter."--Provided by publisher.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security : review questions and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security : review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security : review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security : review questions and hands-on exercises.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
653 |
|
0 |
|a datasikkerhet
|a datasikring
|a datanettverk
|a sikkerhet
|a lokale datanettverk
|
700 |
1 |
|
|a Grow, Christopher,
|e author.
|
700 |
1 |
|
|a Craig, Philip,
|e author.
|
700 |
1 |
|
|a Short, Donald,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119362395/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|