Cisco Certified CyberOps Associate 200-201 certification guide (Record no. 384134)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01656cam a2200241Mi 4500 |
001 - CONTROL NUMBER | |
control field | on1256686369 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | APU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240611133206.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210510s2021 enk fs 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781800560871 (paperback) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1256686369 |
040 ## - CATALOGING SOURCE | |
Language of cataloging | english |
Transcribing agency | APU |
Modifying agency | SY |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
Item number | .G54 2021 c.1 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Singh, Glen D., |
Relator term | author. |
9 (RLIN) | 49030 |
245 10 - TITLE STATEMENT | |
Title | Cisco Certified CyberOps Associate 200-201 certification guide |
Remainder of title | learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / |
Statement of responsibility, etc | Glen D. Singh. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Birmingham : |
Name of producer, publisher, distributor, manufacturer | Packt Publishing, |
Date of production, publication, distribution, manufacture, or copyright notice | ©2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvii, 635 pages, |
Other physical details | illustrations, |
Dimensions | 24 cm. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- <br/><br/>Section 1: Exploring Networking Concepts<br/>Exploring Network Components and Security Systems<br/>Discovering Security Concepts<br/><br/>Section 2:<br/>Understanding Security Principles<br/>Identifying Attack Methods<br/>Working with Cryptography and PKI<br/><br/>Section 3:<br/>Delving into Endpoint Threat Analysis<br/>Interpreting Endpoint Security<br/>Exploring Computer Forensics<br/>Performing Intrusion Analysis<br/><br/>Section 4:<br/>Security Management Techniques<br/>Dealing with Incident Response<br/>Implementing Incident Handling<br/>Implementing Cisco Security Solutions<br/>Working with Cisco Security Solutions<br/>Real-World Implementation and Best Practices<br/><br/>Mock Exam 1<br/>Mock Exam 2<br/><br/><br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
General subdivision | Examinations |
Form subdivision | Study guides. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic data processing personnel |
General subdivision | Certification |
Form subdivision | Study guides. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Invoice number | Cost, normal purchase price | Full call number | Barcode | Date last seen | Copy number | Cost, replacement price | Price effective from | Koha item type | PO number |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not Withdrawn | Available | Not Damaged | Available for loan | Book | APU Library | APU Library | Open Shelf | 11/06/2024 | EMO | IV-024003 | 302.95 | TK5105.59 .G54 2021 c.1 | 00013119 | 11/06/2024 | 1 | 302.95 | 11/06/2024 | General Circulation | U-2023/03/1172 |