Asia Pacific University Library catalogue


Cisco Certified CyberOps Associate 200-201 certification guide (Record no. 384134)

000 -LEADER
fixed length control field 01656cam a2200241Mi 4500
001 - CONTROL NUMBER
control field on1256686369
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240611133206.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210510s2021 enk fs 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781800560871 (paperback)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1256686369
040 ## - CATALOGING SOURCE
Language of cataloging english
Transcribing agency APU
Modifying agency SY
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .G54 2021 c.1
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Singh, Glen D.,
Relator term author.
9 (RLIN) 49030
245 10 - TITLE STATEMENT
Title Cisco Certified CyberOps Associate 200-201 certification guide
Remainder of title learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /
Statement of responsibility, etc Glen D. Singh.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham :
Name of producer, publisher, distributor, manufacturer Packt Publishing,
Date of production, publication, distribution, manufacture, or copyright notice ©2021.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 635 pages,
Other physical details illustrations,
Dimensions 24 cm.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- <br/><br/>Section 1: Exploring Networking Concepts<br/>Exploring Network Components and Security Systems<br/>Discovering Security Concepts<br/><br/>Section 2:<br/>Understanding Security Principles<br/>Identifying Attack Methods<br/>Working with Cryptography and PKI<br/><br/>Section 3:<br/>Delving into Endpoint Threat Analysis<br/>Interpreting Endpoint Security<br/>Exploring Computer Forensics<br/>Performing Intrusion Analysis<br/><br/>Section 4:<br/>Security Management Techniques<br/>Dealing with Incident Response<br/>Implementing Incident Handling<br/>Implementing Cisco Security Solutions<br/>Working with Cisco Security Solutions<br/>Real-World Implementation and Best Practices<br/><br/>Mock Exam 1<br/>Mock Exam 2<br/><br/><br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing personnel
General subdivision Certification
Form subdivision Study guides.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Full call number Barcode Date last seen Copy number Cost, replacement price Price effective from Koha item type PO number
Not Withdrawn Available   Not Damaged Available for loan Book APU Library APU Library Open Shelf 11/06/2024 EMO IV-024003 302.95 TK5105.59 .G54 2021 c.1 00013119 11/06/2024 1 302.95 11/06/2024 General Circulation U-2023/03/1172