000 -LEADER |
fixed length control field |
02152nam a22003257a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220903105529.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
a|||||r|||| 00| 0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
tu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220213b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Qualifying information |
9781774074015 (e-book) |
040 ## - CATALOGING SOURCE |
Language of cataloging |
English. |
Transcribing agency |
CvSU-CCAT Campus Library. |
Description conventions |
rda. |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9. A25 |
Item number |
P33 2020 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Padallan, Jocelyn O., author. |
9 (RLIN) |
4541 |
245 ## - TITLE STATEMENT |
Title |
Cyber security / |
Statement of responsibility, etc. |
Jocelyn O. Padallan. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Oakville, Ontario : |
Name of publisher, distributor, etc. |
Arcler Press, |
Date of publication, distribution, etc. |
c2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 247 pages : |
Other physical details |
colored illustrations |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
computer |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
online resource |
500 ## - GENERAL NOTE |
Materials specified |
To access the E-Book : https://www.bibliotex.com/ (Log-in/Register is required). |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1: Cyber Crime : A aMarket of Vulnerability<br/>Chapter 2: Cyber Security and its Fundamentals<br/>Chapter 3: Management of Cyber Security<br/>Chapter 4: Cyber Investigation and Digital Forensics<br/>Chapter 5: Social media, Bullet and Intrusion Detection<br/>Chapter 6: Cyber Security and Industrial Control Systems<br/>Chapter 7: Legal Framework for Cyber Security<br/>Chapter 8: Cyber Security and Automation |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cyber Security explains cybercrime in terms of a market of vulnerability and lays down the fundamentals of cyber security. It explains the management of cyber security and informs the readers about the cyber investigators and digital forensics. Also discussed in the book is the explanation of social media, botnet and the intrusion detection, the relation of cyber security with industrial control systems, the legal framework for cyber security and the role of automation in cyber security. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Accession number |
EBOP00007 |
Extent |
1 |
546 ## - LANGUAGE NOTE |
Materials specified |
In English text. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
2585 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks. |
9 (RLIN) |
4690 |
Form subdivision |
Security measures. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Electronic name |
Bibliotex. |
Materials specified |
Electronic Resources |
Public note |
<a href="https://www.bibliotex.com/pdfreader/cyber-security50131894">https://www.bibliotex.com/pdfreader/cyber-security50131894</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
E-Books |
Classification part |
QA 76.9. A25 P33 2020 |
Call number prefix |
EBOP |