000 -LEADER |
fixed length control field |
03234nam a22009017a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250324101825.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250321s2023 oncad 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781774695333 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
QCPL |
Description conventions |
rda |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Singh, Manmohan |
Relator term |
author |
245 10 - TITLE STATEMENT |
Title |
Advance cyber security |
Statement of responsibility, etc. |
/ Manmohan Singh [and three others] |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Burlington, Ontario : |
Name of producer, publisher, distributor, manufacturer |
Arcler Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2023] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 269 pages : |
Other physical details |
color illustrations |
336 ## - Content Type |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
338 ## - Carrier Type |
Source |
rdacarrier |
Carrier type term |
volume |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter I. Introduction to cybercrime |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Computer crime |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Unauthorized access |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
History of cybercrime |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Categories of cybercrime |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Types of cybercrime |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Cybercrime in modern society |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 2. System vulnerabilities |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Network vulnerabilities |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Key actions |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Web application vulnerability (OWASP 10) |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 3. Network security |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Firewall |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Types of firewall |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
DMZ |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
IP addressing scheme |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Authentication, authorization, and accounting |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Honey pot |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Intrusion detection and prevention system |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Virtual Private Network (VPN) |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
VPN security |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Network Address Translation (NAT) and port forwarding |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 4. Cyber forensics |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
In-house investigation |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Lifecycle : digital forensics |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Issues facing computer forensics |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Digital forensics laboratory usages |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Special purpose forensics workstation |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Basic customized forensic workstation |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Stocking hardware peripherals |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Computer forensics tools |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 5. IR - incident response |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Understanding the cyber security incident |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Conducting triage |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Carrying out first response |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Performing initial analysis |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Containing the cyber security incident |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Eradicating the cause of the incident |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Gathering and preserving evidence |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Recover systems, data, and connectivity back to normal |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 6. Online safety and precautions |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
E-mail scams safety precautions |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Securing your computer from cybercrime attacks |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Staying safe on social media |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Social media safety precautions |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Exercising caution when shopping online |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Safety installation of application |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Prevent spyware from getting onto your computer |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Protect your identity online |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Golden rules for online safety |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Practical approach |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
Computers & technology |
9 (RLIN) |
10971 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Sharma, Priyanka |
Relator term |
author |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Sharma, Rahul |
Relator term |
author |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Vyas, Monika |
Relator term |
author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |