MARC details
000 -LEADER |
fixed length control field |
01599nam a22003377a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231129110449.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231129b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0367562278 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367562274 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367562328 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367562274 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781003096894 |
041 ## - LANGUAGE CODE |
Language |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
Classification number |
005.8 |
Item number |
MOS |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Moseley, Ralph. |
240 ## - UNIFORM TITLE |
Uniform title |
<a href="Advanced Cybersecurity Technologies">Advanced Cybersecurity Technologies</a> |
245 ## - TITLE STATEMENT |
Title |
Advanced Cybersecurity Technologies / |
Statement of responsibility, etc |
Ralph Moseley. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Florida : |
Name of publisher, distributor, etc |
CRC Press, |
Date of publication, distribution, etc |
2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 204 p.: |
Other physical details |
ill, ; |
Dimensions |
25 cm. |
505 ## - FORMATTED CONTENTS NOTE |
Contents |
1. Introduction<br/><br/>2. Web and Network Basics<br/><br/>3. Cryptography<br/><br/>4. Hacking<br/><br/>5. Packet Analysis and Pen Testing<br/><br/>6. Social Engineering<br/><br/>7. Cyber Countermeasures<br/><br/>8. Incident Response and Mitigation<br/><br/>9. Digital Forensics<br/><br/>10. Special Topics: Counter Surveillance<br/><br/>11. Special Topics: Securing the IoT<br/><br/>12. Acronyms<br/><br/>13. Index |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book looks at the technical fields of Cybersecurity progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Hacking |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
IoT |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Digital Forensics |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Social Engineering |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Steganography |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |