Cybersecurity for everyone / (Record no. 17858)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04209cam a2200601Ii 4500 |
001 - CONTROL NUMBER | |
control field | 9781003124030 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220724194447.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 201201s2021 flu o 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000298611 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000298612 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367642785 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 0367642786 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000298673 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000298671 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000298642 |
Qualifying information | (Mobipocket ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000298647 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003124030 |
Qualifying information | (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003124038 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1201/9781003124030 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1224862228 |
Canceled/invalid control number | (OCoLC)1201179827 |
-- | (OCoLC)1202463565 |
-- | (OCoLC)1203944089 |
-- | (OCoLC)1225552248 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1224862228 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 012040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 014000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 015000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UGC |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Skillicorn, David B., |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity for everyone / |
Statement of responsibility, etc. | David B. Skillicorn. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Boca Raton : |
Name of producer, publisher, distributor, manufacturer | CRC Press, |
Date of production, publication, distribution, manufacture, or copyright notice | 2021. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2021 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (viii, 94 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | CRC focus |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- 1. Introduction -- 2. How cyberspace works -- 2.1. Encounters with cyberspace -- 2.2. What is cyberspace? -- 2.3. Nodes -- 2.4. People -- 2.5. Pipes -- 2.6. Configuration -- 2.7. Types of traffic -- 2.8. The Deep Web -- 2.9. The Dark Web -- 2.10. The World Wide Web -- 2.11. Social aspects -- 2.12. Governance -- 2.13. Security issues -- 2.14. Non-benign use of cyberspace -- 3. Encryption and hashing -- 3.1. Private key encryption -- 3.2. Public key encryption -- 3.3. Digital signing and digital hashing |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.4. Encryption in use -- 4. Node security -- 4.1. Getting access to nodes -- 4.2. Malware -- 4.3. What does malware do? -- 4.4. Direct attacks -- 5. Pipe security -- 5.1. IP -- 5.2. TCP -- 5.3. UDP -- 5.4. Attacks leveraging protocols -- 5.5. Countermeasures -- 6. Configuration security -- 6.1. Internet Control Message Protocol -- 6.2. Domain Name Service -- 6.3. Switch vulnerabilities -- 6.4. Mounting an attack -- 6.5. Defending against attacks -- 6.6. Recovery -- 7. Application security -- 7.1. Email -- 7.2. Web traffic -- 7.3. Blockchains -- 8. Summary -- Index |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Computer Graphics / Game Programming & Design |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Computer Science |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / Viruses |
Source of heading or term | bisacsh |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Read Online |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781003124030">https://www.taylorfrancis.com/books/9781003124030</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | eBook |
No items available.