MARC details
000 -LEADER |
fixed length control field |
02576nam a22002177a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230424102744.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230424b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781788823074 |
041 ## - LANGUAGE CODE |
Language |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
MAC |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Mack, Markus |
245 ## - TITLE STATEMENT |
Title |
Cyber Security / |
Statement of responsibility, etc |
Markus Mack |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
London: |
Name of publisher, distributor, etc |
Ed-Tech Press, |
Date of publication, distribution, etc |
2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
337hbk.: |
Other physical details |
ill.: |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Contents: 1. Cyber Security, 2. Networking Security, 3. Security Threats and Vulnerabilities, 4. Server Management Security and Firewalls, 5. System Security. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Cybersecurity refers to the measures taken to keep electronic information private and safe from damage or theft. It is also used to make sure these devices and data are not misused. Cybersecurity applies to both software and hardware, as well as information on the Internet, and can be used to protect everything from personal information to complex government systems. Cyber security is a distributed problem partly because of the distributed nature of the underlying infrastructure and partly because industries, government and individuals all come at it with different perspectives. Under these circumstances regulation is best attempted from the bottom up, and legalisation, especially in the area of criminal law, should be sharply focused. There is the need for distributed approaches instead of the more traditional single, concentrated approach. Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Cybersecurity training teaches professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies. The spread of modern information technologies has brought about considerable changes in the global environment, ranging from the speed of economic transactions to the nature of social interactions to the management of military operations in both peacetime and war. The development of information technology makes it possible for adversaries to attack each other in new ways and with new forms of damage, and may create new targets for attack. This book fully introduces the theory and practice of cyber security. Comprehensive in scope, it covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It treats both the management and engineering issues of computer security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Science, IT, Cyber Security |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Department Name |
Computer Science |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |