Cargando…

Cybersecurity essentials /

"Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter."--Provided by publisher.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Brooks, Charles J. (Autor), Grow, Christopher (Autor), Craig, Philip (Autor), Short, Donald (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Indiana : Sybex a Wiley brand, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1128107243
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 191120s2018 inua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d CHK  |d YWS  |d OCLCO 
020 |a 9781119362456 
020 |a 1119362458 
020 |z 9781119362395 
035 |a (OCoLC)1128107243 
037 |a CL0501000084  |b Safari Books Online 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Brooks, Charles J.,  |e author. 
245 1 0 |a Cybersecurity essentials /  |c Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short. 
246 3 |a Cyber security essentials 
264 1 |a Indianapolis, Indiana :  |b Sybex a Wiley brand,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed November 18, 2019). 
520 |a "Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter."--Provided by publisher. 
500 |a Includes index. 
505 0 |a Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security : review questions and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security : review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security : review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security : review questions and hands-on exercises. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
653 0 |a datasikkerhet  |a datasikring  |a datanettverk  |a sikkerhet  |a lokale datanettverk 
700 1 |a Grow, Christopher,  |e author. 
700 1 |a Craig, Philip,  |e author. 
700 1 |a Short, Donald,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119362395/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP