MARC details
000 -LEADER |
fixed length control field |
02338nam a2200229 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250807184533.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250807b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780262542548 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
WIL |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wilson, Duane C |
245 ## - TITLE STATEMENT |
Title |
Cybersecurity |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc. |
The MIT Press |
Place of publication, distribution, etc. |
Cambridge, Massachusetts |
Date of publication, distribution, etc. |
2021 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
147 p. |
365 ## - TRADE PRICE |
Price type code |
USD |
Price amount |
16.95 |
490 ## - SERIES STATEMENT |
Series statement |
The MIT Press Essential Knowledge series |
520 ## - SUMMARY, ETC. |
Summary, etc. |
An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.<br/><br/>It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks—attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cyber security expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.<br/><br/>Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.<br/><br/>(https://mitpress.mit.edu/9780262542548/cybersecurity/) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Book |
Source of classification or shelving scheme |
Dewey Decimal Classification |