Normal view MARC view ISBD view

Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.

By: Brooks, Charles J [author].
Contributor(s): Grow, Christopher [author] | Craig, Philip (Engineer) [author] | Short, Donald [author].
Material type: materialTypeLabelBookPublisher: Indianapolis, Indiana : John Wiley & Sons Inc., [2018]Copyright date: ©2018Description: xxvi, 758 pages : illustrations ; 24 cm.Content type: text | Media type: unmediated Carrier type: volumeISBN: 9781119362395 (paperback); 1119362393.Other title: Cyber security essentials.Subject(s): Computer networks -- Security measures | Computer security | Computer networks -- Security measures | Computer securityDDC classification: 005.8
Contents:
Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.
Summary: "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
Tags from this library: No tags from this library for this title.
    average rating: 0.0 (0 votes)
Item type Current location Call number Copy number Status Date due Barcode Item holds
Books Books Main Library: Circulation Section
TK 5105.59 .B766 2018 (Browse shelf) c.1 Available 19-033215
Total holds: 0

Includes index.

Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises.

"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.

There are no comments for this item.

Log in to your account to post a comment.

Ninoy Aquino Library and Learning Resource Center ©2016
A. Mabini Campus Anonas St., Sta. Mesa, Manila 1016
Telephone: +02 5335-1787 | Email: library@pup.edu.ph

Powered by Koha