Catalog - Resource Center for Learning and Research

Back to Site - CRAI Library
Normal view MARC view ISBD view

Cybersecurity : the beginner´s guide / Erdal Ozkaya

By: Ozkaya, Erdal [autor].
Contributor(s): Boricha, Vijin [editor comisionado] | Bhavsar, Heramb [editor de adquisiciones] | Bhattacharya, Shubham [desarrollador de contenido] | Thore, Deepti [desarrollador de contenido] | Almeida, Rudolph [editor técnico] | Editing, Safis [editor y corrector de pruebas] | Ansari, Nusaiba [coordinador del proyecto] | Daruwale Soni, Tejal [indexador] | Chirayil, Jisha [ilustrador] | Mohite, Nilesh [coordinador de producción].
Material type: TextTextPublisher: Birmingham : Pact Publising, 2019Description: ix, 377 páginas : fotos b/n, gráficas ; 23 x 18 cm.ISBN: 9781789616194.Subject(s): CiberseguridadDDC classification: 005.8 O977c Online resources: Click here to access online
Contents:
Preface | Chapter 1: Importance of Cybersecurity | Chapter 2: Security Evolution - From Legacy to Advanced, to ML and AI | Chapter 3: Learning Cybersecurity Technololgies | Chapter 4: Skills We Need for a Cybersecurity Career | Chapter 5: Attacker Mindset | Chapter 6: Understanding Reactive, Proactive, and Operational Security | Chapter 7: Nteworking, Mentoring, and Shadowing Mentoring | Chapter 8: Cybersecurity Labs | Chapter 9: Knowledge Check and Certifications | Chapter 10: Security Intelligence Resources | Chapter 11: Expert Opinios on Getting Startes with Cybersecurity | Chapter 12: How to Get Hired in Cybersecurity, Redardless of Your Background | Other Books You May Enjoy | Index
Item type Current location Collection Call number Copy number Status Date due Barcode
Libro (general) Biblioteca Central UNIBE
Área de exhibición
General 005.8 O977c (Browse shelf) Ej.1 Available 240418

Información del autor y críticos al inicio de la obra, comentario de la misma en la contraportada. Al final de cada capítulo hay un resumen y lecturas recomendadas

Preface |
Chapter 1: Importance of Cybersecurity |
Chapter 2: Security Evolution - From Legacy to Advanced, to ML and AI |
Chapter 3: Learning Cybersecurity Technololgies |
Chapter 4: Skills We Need for a Cybersecurity Career |
Chapter 5: Attacker Mindset |
Chapter 6: Understanding Reactive, Proactive, and Operational Security |
Chapter 7: Nteworking, Mentoring, and Shadowing Mentoring |
Chapter 8: Cybersecurity Labs |
Chapter 9: Knowledge Check and Certifications |
Chapter 10: Security Intelligence Resources |
Chapter 11: Expert Opinios on Getting Startes with Cybersecurity |
Chapter 12: How to Get Hired in Cybersecurity, Redardless of Your Background |
Other Books You May Enjoy |
Index