Detalles MARC
000 -LEADER |
fixed length control field |
02289nam a2200253 4500 |
001 - CONTROL NUMBER |
control field |
0000000483 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DO-SdBDB |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230312170944.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200208t20202020us a grg 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978119560326 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DO-SdBDB |
Language of cataloging |
spa |
Transcribing agency |
DO-SdBDB |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
043 ## - GEOGRAPHIC AREA CODE |
Geographic area code |
n-us |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76 .9 .A25 |
Item number |
.S84 2020 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Steinberg, Joseph. |
245 ## - TITLE STATEMENT |
Title |
Cybersecurity for dummies / |
Statement of responsibility, etc. |
Joseph Steinberg. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Indianapolis : |
Name of publisher, distributor, etc. |
John Wiley & Son, |
Date of publication, distribution, etc. |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 346 páginas : |
Other physical details |
ilustraciones, figuras a blanco y negro ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Material de apoyo del Departamento Sistema y Tecnología. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction, 1 -- |
Title |
Part 1. Getting Started with Cybersecurity, 5 -- |
-- |
Chapter 1. What Exactly Is Cybersecurity?, 7 -- |
-- |
Chapter 2. Getting to Know Common Cyberattacks, 21 -- |
-- |
Chapter 3. Bad Guys and Accidental Bad Guys: The Folks You Must Defend Against, 43 -- |
-- |
Part 2. Improving Your Own Personal Security, 65 -- |
-- |
Chapter 4. Evaluating Your Current Cybersecurity Posture, 67 -- |
-- |
Chapter 5. Enhancing Physical Security, 85 -- |
-- |
Part 3. Protecting Yourself from Yourself, 97 -- |
-- |
Chapter 6. Securing Your Accounts, 99 -- |
-- |
Chapter 7. Passwords, 117 -- |
-- |
Chapter 8. Preventing Social Engineering, 133 -- |
-- |
Part 4. Cybersecurity for Businesses and Organizations, 153 -- |
-- |
Chapter 9. Securing Your Small Business, 155 -- |
-- |
Chapter 10. Cybersecurity and Big Businesses, 175 -- |
-- |
Part 5. Handling a Security Incident (This Is a When, Not an If), 189 -- |
-- |
Chapter 11. Identifying a Security Breach, 191 -- |
-- |
Chapter 12. Recovering from a Security Breach, 209 -- |
-- |
Part 6. Backing Up and Recovery, 227 -- |
-- |
Chapter 13. Backing Up, 229 -- |
-- |
Chapter 14. Resetting Your Device, 253 -- |
-- |
Chapter 15. Restoring from Backups, 263 -- |
-- |
Part 7. Looking toward the Future, 285 -- |
-- |
Chapter 16. Pursuing a Cybersecurity Career, 287 -- |
-- |
Chapter 17. Emerging Technologies Bring New Threats, 301 -- |
-- |
Part 8. The Part of Tens, 313 -- |
-- |
Chapter 18. Ten Ways You Can Improve Your Cybersecurity without Spending a Fortune, 315 -- |
-- |
Chapter 19. Ten Lessons from Major Cybersecurity Breaches, 321 -- |
-- |
Chapter 20. Ten Ways to Safely Use Public Wi-Fi, 327 -- |
-- |
Index, 331. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Seguridad en computadores. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Protección de datos. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Monografía - Colección General |