000 | 03741cam a2200517Ki 4500 | ||
---|---|---|---|
001 | 9781003035626 | ||
003 | FlBoTFG | ||
005 | 20220711212054.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200511s2020 flu ob 000 0 eng d | ||
040 |
_aOCoLC-P _beng _cOCoLC-P |
||
020 |
_a9781000059571 _q(electronic bk.) |
||
020 |
_a100005957X _q(electronic bk.) |
||
020 |
_a9781003035626 _q(electronic bk.) |
||
020 |
_a1003035620 _q(electronic bk.) |
||
020 |
_a9781000059632 _q(electronic bk. : EPUB) |
||
020 |
_a1000059634 _q(electronic bk. : EPUB) |
||
020 |
_a9781000059601 _q(electronic bk. : Mobipocket) |
||
020 |
_a100005960X _q(electronic bk. : Mobipocket) |
||
020 | _z0367472503 | ||
020 | _z9780367472504 | ||
035 |
_a(OCoLC)1153272486 _z(OCoLC)1154053436 |
||
035 | _a(OCoLC-P)1153272486 | ||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aEDU _x039000 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
072 | 7 |
_aUR _2bicssc |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aThakur, Kutub. _912859 |
|
245 | 1 | 0 |
_aCybersecurity fundamentals _h[electronic resource] : _ba real-world perspective / _cDr Kutub Thakur, Dr Al-Sakib Khan Pathan. |
250 | _aFirst edition. | ||
260 |
_aBoca Raton, FL : _bCRC Press, _c2020. |
||
300 | _a1 online resource. | ||
520 | _aCybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 7 |
_aEDUCATION / Computers & Technology _2bisacsh _912860 |
|
650 | 7 |
_aCOMPUTERS / Networking / Security _2bisacsh _912816 |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh _96769 |
|
700 | 1 |
_aPathan, Al-Sakib Khan. _912751 |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003035626 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 | _cEBK | ||
999 |
_c70310 _d70310 |