Cybersecurity : (Record no. 384152)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01642nam a2200253 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | APU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240705140108.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240705t2019 -uka|||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781789616194 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | APU |
Language of cataloging | english |
Transcribing agency | APU |
Modifying agency | SY |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | .O95 2019 c.1 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Ozkaya, Erdal, |
Relator term | author. |
9 (RLIN) | 49039 |
245 14 - TITLE STATEMENT | |
Title | Cybersecurity : |
Remainder of title | The Beginner's guide |
Statement of responsibility, etc | Erdal Ozkaya. |
246 14 - VARYING FORM OF TITLE | |
Title proper/short title | A comprehensive guide to getting started in cybersecurity. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Birmingham : |
Name of publisher, distributor, etc | Packt Publishing, Limited, |
Date of publication, distribution, etc | ©2019. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | ix, 379 pages : |
Other physical details | illustrations, |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | Includes indexes. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field."--Publisher's description |
650 1# - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers |
General subdivision | Information Technology |
9 (RLIN) | 49101 |
650 1# - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers |
General subdivision | Operating Systems |
9 (RLIN) | 49102 |
650 1# - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | General Computer Security |
General subdivision | Computer security |
9 (RLIN) | 49103 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Invoice number | Cost, normal purchase price | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Copy number | Cost, replacement price | Price effective from | Koha item type | PO number |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not Withdrawn | Available | Not Damaged | Available for loan | Book | APU Library | APU Library | Open Shelf | 05/07/2024 | EMO | IV-032019 | 437.13 | 1 | 2 | QA76.9.A25 .O95 2019 c.1 | 00013188 | 18/09/2024 | 05/09/2024 | 1 | 437.13 | 05/07/2024 | General Circulation | U-2023/12/1203 |