Advance cyber security (Record no. 25742)

MARC details
000 -LEADER
fixed length control field 03234nam a22009017a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250324101825.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250321s2023 oncad 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781774695333
040 ## - CATALOGING SOURCE
Transcribing agency QCPL
Description conventions rda
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Singh, Manmohan
Relator term author
245 10 - TITLE STATEMENT
Title Advance cyber security
Statement of responsibility, etc. / Manmohan Singh [and three others]
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Burlington, Ontario :
Name of producer, publisher, distributor, manufacturer Arcler Press,
Date of production, publication, distribution, manufacture, or copyright notice [2023]
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 269 pages :
Other physical details color illustrations
336 ## - Content Type
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - Carrier Type
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter I. Introduction to cybercrime
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Computer crime
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Unauthorized access
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note History of cybercrime
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Categories of cybercrime
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Types of cybercrime
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cybercrime in modern society
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 2. System vulnerabilities
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Network vulnerabilities
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Key actions
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Web application vulnerability (OWASP 10)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 3. Network security
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Firewall
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Types of firewall
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note DMZ
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note IP addressing scheme
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Authentication, authorization, and accounting
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Honey pot
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intrusion detection and prevention system
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Virtual Private Network (VPN)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note VPN security
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Network Address Translation (NAT) and port forwarding
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 4. Cyber forensics
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note In-house investigation
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Lifecycle : digital forensics
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Issues facing computer forensics
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Digital forensics laboratory usages
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Special purpose forensics workstation
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Basic customized forensic workstation
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Stocking hardware peripherals
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Computer forensics tools
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 5. IR - incident response
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Understanding the cyber security incident
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Conducting triage
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Carrying out first response
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Performing initial analysis
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Containing the cyber security incident
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Eradicating the cause of the incident
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Gathering and preserving evidence
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Recover systems, data, and connectivity back to normal
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 6. Online safety and precautions
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note E-mail scams safety precautions
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Securing your computer from cybercrime attacks
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Staying safe on social media
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Social media safety precautions
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Exercising caution when shopping online
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Safety installation of application
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Prevent spyware from getting onto your computer
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Protect your identity online
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Golden rules for online safety
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Practical approach
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element Computers & technology
9 (RLIN) 10971
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sharma, Priyanka
Relator term author
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sharma, Rahul
Relator term author
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Vyas, Monika
Relator term author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Lost status Library use only Collection code Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Full call number Barcode Copy number Koha item type
  Room use only Reference Cubao Branch Cubao Branch Reference Section 12/17/2024 Purchased 10464.00 2024-07-02-2892-01-1122 R 005.8 Si617a 2023 57928QC c. 2 Book
  Room use only Reference Lagro Branch Lagro Branch Reference Section 12/17/2024 Purchased 10464.00 2024-07-02-2893-01-1122 R 005.8 Si617a 2023 57929QC c. 3 Book
  Room use only Reference Main Library Main Library Reference Section 12/17/2024 Purchased 10464.00 2024-07-02-2891-01-1122 R 005.8 Si617a 2023 57927QC c. 1 Book
  Room use only Reference Talipapa Branch Talipapa Branch Reference Section 12/17/2024 Purchased 10464.00 2024-07-02-2894-01-1122 R 005.8 Si617a 2023 57930QC c. 4 Book