MARC details
| 000 -LEADER |
| fixed length control field |
01854nam a22003137a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250929100016.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
250929b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781774697511 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1774697513 |
| 040 ## - CATALOGING SOURCE |
| Language of cataloging |
eng |
| Transcribing agency |
TUPM |
| Description conventions |
rda |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA 76.9 |
| Item number |
A44 2024 |
| 100 ## - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Ameer, Iqra |
| 245 ## - TITLE STATEMENT |
| Title |
Cyber security/ |
| Statement of responsibility, etc. |
Iqra Ameer |
| 264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Burlington, ON, |
| Name of producer, publisher, distributor, manufacturer |
Toronto Academic Press, |
| Date of production, publication, distribution, manufacture, or copyright notice |
c2024. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xii, 236 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
25 cm |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographic references and index. |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Cyber security and cyber crime<br/>Cyber security threats with new perspectives<br/>Fundamentals of cyber security<br/>Attacker techniques and motivations<br/>Cyber-risk managament<br/>Cyber world today<br/>Cyber security concerns for emergency managament<br/>Software security and trusted systems |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"This text provides an in-depth overview of the ever-evolving field of cybersecurity. It covers a range of topics, including information security, network security, cryptography, and ethical hacking. The book is designed to help individuals and organizations understand the threats and vulnerabilities that exist in the digital world, and to develop strategies to protect themselves from cyber-attacks. Whether you are an IT professional, a business owner, or just someone interested in the topic, this book is an essential resource for anyone looking to enhance their understanding of cybersecurity." -- |
| Expansion of summary note |
Description from Amazon |
| 590 ## - CITATION |
| Citation |
Ameer, I. (2024). Cyber security. Toronto Academic Press. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Information technology |
| General subdivision |
Security measures |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Library of Congress Classification |
| Koha item type |
Book |
| Suppress in OPAC |
No |