Cybersecurity for beginners / (Record no. 2763)

MARC details
000 -LEADER
fixed length control field 02173nam a22002657a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220603094653.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781911452034
040 ## -
-- HITLIB
-- rda
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number MEE
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Meeuwisse, Raef
Relator term author
245 10 - TITLE STATEMENT
Title Cybersecurity for beginners /
Statement of responsibility, etc. Raef Meeuwisse
250 ## - EDITION STATEMENT
Edition statement Second edition
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hythe, Kent :
Name of producer, publisher, distributor, manufacturer Cyber Simplicity,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 205 pages :
Other physical details illustrations
336 ## -
-- rdacontent
-- text
-- txt
337 ## -
-- rdamedia
-- unmediated
-- n
338 ## -
-- rdacarrier
-- volume
-- nc
500 ## - GENERAL NOTE
General note Includes index
505 ## -
-- Cybersecurity & its origins --<br/>About the case studies --<br/>Case study- Target 2013 --<br/>The disciplines within cybersecurity --<br/>Case study- Edward Snowden 2013 --<br/>Basic cybersecurity concepts. Identify --<br/>Protect --<br/>Detect, respond and recover --<br/>Repeat and refine --<br/>Defense in depth --<br/>Human factors --<br/>Technical cybersecurity --<br/>Evolving attack and defense methods --<br/>Case study- Sony (2014) --<br/>The cybersecurity Cold War --<br/>Risk-based cybersecurity & stacked risk --<br/>How cyber exposed are you? --<br/>What to do when things go wrong --<br/>A glimpse toward the future --<br/>Bringing it all together --<br/>Cybersecurity to English dictionary.
520 ## -
-- This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before.'
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Date last checked out Copy number Price effective from Koha item type
    Library of Congress Classification     Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection 23/02/2022 Donation : American Center Library 3789/D 1 QA76.9.A25 MEE BK002226 06/11/2023 27/10/2023 1 03/06/2022 Books