Cybersecurity (Record no. 58860)

MARC details
000 -LEADER
fixed length control field 02393 a2200241 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230809b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780262542548
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 WIL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Wilson, Duane C
245 ## - TITLE STATEMENT
Title Cybersecurity
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cambridge, Massachusetts:
Name of publisher, distributor, etc The MIT Press,
Date of publication, distribution, etc 2021.
300 ## - PHYSICAL DESCRIPTION
Extent vii, 147p.:
Other physical details ill.; pbk.:
Dimensions 18cm.
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE
Title MIT press essential knowledge series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes Further readings and Index
520 ## - SUMMARY, ETC.
Summary, etc An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.<br/><br/>It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks–attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.<br/>Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.<br/><br/>https://www.penguinrandomhouse.com/books/675912/cybersecurity-by-duane-c-wilson/
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet--Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Malware
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last borrowed Copy number Cost, replacement price Koha item type
    Dewey Decimal Classification     General IIT Gandhinagar IIT Gandhinagar 09/08/2023 CBS 1401.42 4 005.8 WIL 033240 05/01/2026 30/11/2025 1 1401.42 Books


Copyright ©  2022 IIT Gandhinagar Library. All Rights Reserved.