Cyber Security / (Record no. 38459)

MARC details
000 -LEADER
fixed length control field 02576nam a22002177a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230424102744.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230424b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781788823074
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number MAC
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Mack, Markus
245 ## - TITLE STATEMENT
Title Cyber Security /
Statement of responsibility, etc Markus Mack
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc London:
Name of publisher, distributor, etc Ed-Tech Press,
Date of publication, distribution, etc 2018.
300 ## - PHYSICAL DESCRIPTION
Extent 337hbk.:
Other physical details ill.:
505 ## - FORMATTED CONTENTS NOTE
Title Contents: 1. Cyber Security, 2. Networking Security, 3. Security Threats and Vulnerabilities, 4. Server Management Security and Firewalls, 5. System Security.
520 ## - SUMMARY, ETC.
Summary, etc Cybersecurity refers to the measures taken to keep electronic information private and safe from damage or theft. It is also used to make sure these devices and data are not misused. Cybersecurity applies to both software and hardware, as well as information on the Internet, and can be used to protect everything from personal information to complex government systems. Cyber security is a distributed problem partly because of the distributed nature of the underlying infrastructure and partly because industries, government and individuals all come at it with different perspectives. Under these circumstances regulation is best attempted from the bottom up, and legalisation, especially in the area of criminal law, should be sharply focused. There is the need for distributed approaches instead of the more traditional single, concentrated approach. Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Cybersecurity training teaches professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies. The spread of modern information technologies has brought about considerable changes in the global environment, ranging from the speed of economic transactions to the nature of social interactions to the management of military operations in both peacetime and war. The development of information technology makes it possible for adversaries to attack each other in new ways and with new forms of damage, and may create new targets for attack. This book fully introduces the theory and practice of cyber security. Comprehensive in scope, it covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It treats both the management and engineering issues of computer security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science, IT, Cyber Security
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Department Name Computer Science
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Date checked out Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 24/04/2023 1 005.8 MAC 46389 29/02/2024 19/02/2024 24/04/2023 General Books

Powered by Koha