Asia Pacific University Library catalogue


Cybersecurity : (Record no. 384152)

000 -LEADER
fixed length control field 01642nam a2200253 4500
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240705140108.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240705t2019 -uka|||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781789616194
040 ## - CATALOGING SOURCE
Original cataloging agency APU
Language of cataloging english
Transcribing agency APU
Modifying agency SY
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number .O95 2019 c.1
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ozkaya, Erdal,
Relator term author.
9 (RLIN) 49039
245 14 - TITLE STATEMENT
Title Cybersecurity :
Remainder of title The Beginner's guide
Statement of responsibility, etc Erdal Ozkaya.
246 14 - VARYING FORM OF TITLE
Title proper/short title A comprehensive guide to getting started in cybersecurity.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Birmingham :
Name of publisher, distributor, etc Packt Publishing, Limited,
Date of publication, distribution, etc ©2019.
300 ## - PHYSICAL DESCRIPTION
Extent ix, 379 pages :
Other physical details illustrations,
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes indexes.
520 ## - SUMMARY, ETC.
Summary, etc "Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field."--Publisher's description
650 1# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Information Technology
9 (RLIN) 49101
650 1# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Operating Systems
9 (RLIN) 49102
650 1# - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element General Computer Security
General subdivision Computer security
9 (RLIN) 49103
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type PO number
Not Withdrawn Available   Not Damaged Available for loan Book APU Library APU Library Open Shelf 05/07/2024 EMO IV-032019 437.13 1 2 QA76.9.A25 .O95 2019 c.1 00013188 18/09/2024 05/09/2024 1 437.13 05/07/2024 General Circulation U-2023/12/1203