Cybersecurity for everyone / (Record no. 17858)

MARC details
000 -LEADER
fixed length control field 04209cam a2200601Ii 4500
001 - CONTROL NUMBER
control field 9781003124030
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220724194447.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 201201s2021 flu o 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000298611
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000298612
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367642785
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0367642786
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000298673
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000298671
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000298642
Qualifying information (Mobipocket ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000298647
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003124030
Qualifying information (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003124038
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781003124030
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1224862228
Canceled/invalid control number (OCoLC)1201179827
-- (OCoLC)1202463565
-- (OCoLC)1203944089
-- (OCoLC)1225552248
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1224862228
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 012040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 014000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 015000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UGC
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Skillicorn, David B.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity for everyone /
Statement of responsibility, etc. David B. Skillicorn.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2021.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2021
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (viii, 94 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement CRC focus
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- 1. Introduction -- 2. How cyberspace works -- 2.1. Encounters with cyberspace -- 2.2. What is cyberspace? -- 2.3. Nodes -- 2.4. People -- 2.5. Pipes -- 2.6. Configuration -- 2.7. Types of traffic -- 2.8. The Deep Web -- 2.9. The Dark Web -- 2.10. The World Wide Web -- 2.11. Social aspects -- 2.12. Governance -- 2.13. Security issues -- 2.14. Non-benign use of cyberspace -- 3. Encryption and hashing -- 3.1. Private key encryption -- 3.2. Public key encryption -- 3.3. Digital signing and digital hashing
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.4. Encryption in use -- 4. Node security -- 4.1. Getting access to nodes -- 4.2. Malware -- 4.3. What does malware do? -- 4.4. Direct attacks -- 5. Pipe security -- 5.1. IP -- 5.2. TCP -- 5.3. UDP -- 5.4. Attacks leveraging protocols -- 5.5. Countermeasures -- 6. Configuration security -- 6.1. Internet Control Message Protocol -- 6.2. Domain Name Service -- 6.3. Switch vulnerabilities -- 6.4. Mounting an attack -- 6.5. Defending against attacks -- 6.6. Recovery -- 7. Application security -- 7.1. Email -- 7.2. Web traffic -- 7.3. Blockchains -- 8. Summary -- Index
520 ## - SUMMARY, ETC.
Summary, etc. Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Graphics / Game Programming & Design
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Science
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / Viruses
Source of heading or term bisacsh
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Read Online
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003124030">https://www.taylorfrancis.com/books/9781003124030</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBook

No items available.

To Reach Us

0206993118
amiu.library@amref.ac.ke

Our Location

Lang’ata Road, opposite Wilson Airport
PO Box 27691 – 00506,   Nairobi, Kenya

Social Networks

Powered by Koha