Cybersecurity (Record no. 10106)

MARC details
000 -LEADER
fixed length control field 02338nam a2200229 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250807184533.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250807b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780262542548
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number WIL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Wilson, Duane C
245 ## - TITLE STATEMENT
Title Cybersecurity
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc. The MIT Press
Place of publication, distribution, etc. Cambridge, Massachusetts
Date of publication, distribution, etc. 2021
300 ## - PHYSICAL DESCRIPTION
Extent 147 p.
365 ## - TRADE PRICE
Price type code USD
Price amount 16.95
490 ## - SERIES STATEMENT
Series statement The MIT Press Essential Knowledge series
520 ## - SUMMARY, ETC.
Summary, etc. An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.<br/><br/>It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks—attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cyber security expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.<br/><br/>Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.<br/><br/>(https://mitpress.mit.edu/9780262542548/cybersecurity/)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet--Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks--Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Bill No Bill Date Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Accession Number Date last seen Copy number Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     IT & Decisions Sciences IN32427 24-07-2025 Indian Institute of Management LRC Indian Institute of Management LRC General Stacks 08/06/2025 Overseas Press India Private 976.15   005.8 WIL 008905 08/06/2025 1 1501.77 08/06/2025 Book

©2025-26 Pragyata: Learning Resource Center. All Rights Reserved.
Indian Institute of Management Bodh Gaya
Uruvela, Prabandh Vihar, Bodh Gaya
Gaya, 824234, Bihar, India

Powered by Koha