Advanced Cybersecurity Technologies / (Record no. 40521)

MARC details
000 -LEADER
fixed length control field 01599nam a22003377a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231129110449.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231129b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0367562278
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367562274
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367562328
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367562274
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003096894
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number MOS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Moseley, Ralph.
240 ## - UNIFORM TITLE
Uniform title <a href="Advanced Cybersecurity Technologies">Advanced Cybersecurity Technologies</a>
245 ## - TITLE STATEMENT
Title Advanced Cybersecurity Technologies /
Statement of responsibility, etc Ralph Moseley.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Florida :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2022.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 204 p.:
Other physical details ill, ;
Dimensions 25 cm.
505 ## - FORMATTED CONTENTS NOTE
Contents 1. Introduction<br/><br/>2. Web and Network Basics<br/><br/>3. Cryptography<br/><br/>4. Hacking<br/><br/>5. Packet Analysis and Pen Testing<br/><br/>6. Social Engineering<br/><br/>7. Cyber Countermeasures<br/><br/>8. Incident Response and Mitigation<br/><br/>9. Digital Forensics<br/><br/>10. Special Topics: Counter Surveillance<br/><br/>11. Special Topics: Securing the IoT<br/><br/>12. Acronyms<br/><br/>13. Index
520 ## - SUMMARY, ETC.
Summary, etc This book looks at the technical fields of Cybersecurity progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IoT
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Digital Forensics
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Social Engineering
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Steganography
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 29/11/2023   005.8 MOS 47788 29/11/2023 29/11/2023 Text Books

Powered by Koha