NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Introduction to the cyber ranges / (Record no. 6058)

MARC details
000 -LEADER
fixed length control field 04033cam a22005778i 4500
001 - CONTROL NUMBER
control field 9781003206071
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122832.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211029s2022 flu ob 001 0 eng
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003206071
Qualifying information (ebk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003206077
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000572247
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000572242
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000572292
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000572293
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032072401
Qualifying information (hbk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032251424
Qualifying information (pbk)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781003206071
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1291600948
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1291600948
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 059000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8076
Edition number 23/eng/20220105
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Pandey, Bishwajeet,
Relator term author.
245 10 - TITLE STATEMENT
Title Introduction to the cyber ranges /
Statement of responsibility, etc. Bishwajeet Pandey, Shabeer Ahmad.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer Chapman & Hall/CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Chapman & Hall/CRC cyber-physical systems
520 ## - SUMMARY, ETC.
Summary, etc. "Introduction to cyber ranges provides a comprehensive, integrative easy to comprehend overview of different aspects involved in cybersecurity arena. It expands on various concepts like cyber situational awareness, simulation and emulation environments and cybersecurity exercises. It also focuses on detailed analysis and comparison of various existing cyber ranges in military, academic and commercial sectors. It highlights every crucial aspect responsible for developing a deeper insight about the working of the cyber ranges, their architectural design, and their need in the market. It conveys how cyber ranges are complex and effective tools in dealing with advanced cyber threats and attacks. Enhancing the network defences, resilience and efficiency of different components of critical infrastructures are the principal objectives of cyber ranges. They provide simulations of possible cyber-attacks and training on how to thwart such attacks. They are widely used in urban enterprise sectors because they present a sturdy and secure setting for hands-on cyber skills training, advanced cybersecurity education, security testing/training and certification. Features: a comprehensive guide to understanding the complexities involved with cyber ranges and other cybersecurity aspects, substantial theoretical know-how on cyber ranges, their architectural design, along with case studies of existing cyber ranges in leading urban sectors like military, academic and commercial, elucidates the defensive technologies used by various cyber ranges in enhancing the security setups of private and government organizations. The text provides information organized in an accessible format for students in engineering, computer science, information management, professionals, researchers and scientists working in fields of IT, cybersecurity, distributed systems and computer networks"--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Study and teaching.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Classroom learning centers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Activity programs in education.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
General subdivision Simulation methods.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Engineering
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Internet / Security
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Networking / Security
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ahmad, Shabeer
Titles and other words associated with a name (Electronics engineer),
Relator term author.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003206071">https://www.taylorfrancis.com/books/9781003206071</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha