Understanding cybersecurity technologies : (Record no. 40436)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01379nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20231121153718.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231121b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780367457457 |
041 ## - LANGUAGE CODE | |
Language | English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23 |
Classification number | 005.8 |
Item number | MOA |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Moallem, Abbas |
245 ## - TITLE STATEMENT | |
Title | Understanding cybersecurity technologies : |
Remainder of title | A guide to selecting the right cybersecurity tools / |
Statement of responsibility, etc | Abbas Moallem |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boca Raton : |
Name of publisher, distributor, etc | CRC Press, Taylor & Francis Group, |
Date of publication, distribution, etc | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxii, 202 p.: |
Other physical details | ill.; |
Dimensions | 23.4 x 15.6 x 1.35 cm. |
505 ## - FORMATTED CONTENTS NOTE | |
Contents | 1. Cybersecurity Technologies Classification <br/>2. Encryption <br/>3. Authentication <br/>4. Biometrics <br/>5. Firewall Technologies <br/>6. Virus Detection <br/>7. Phishing Detection <br/>8. Endpoint Protection <br/>9. Malware Protection Technology <br/> |
Title | 10. The Internet of Things (IoT) <br/>11. Network Security <br/>12. Location Tracking <br/>13. Surveillance <br/>14. Insider Threat Protection <br/>15. Intrusion Detection <br/>16. Vulnerability Scanning <br/>17. Penetration Testing |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book is intended to help all professionals new to cybersecurity, students, and experts to use the content to learn or educate their audiences on the foundations of the solutions already offered |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS / Networking / Security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Security |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Department Name | Computer Science |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | General Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Location | Shelving location | Date of Cataloging | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Non-fiction | CUTN Central Library | CUTN Central Library | Generalia | 21/11/2023 | 005.8 MOA | 46871 | 21/11/2023 | 21/11/2023 | General Books |