<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000nmm a22000004i 4500</leader>
  <controlfield tag="001">UP-8027390931311611248</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20250214165816.0</controlfield>
  <controlfield tag="006">m    |o  d |      </controlfield>
  <controlfield tag="007">cr |||||||||||</controlfield>
  <controlfield tag="008">250214s2022    nyu        u        eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781260474312 (eBook) </subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(Buklod)UP-8027390931311454137</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="d">DENGII</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="084" ind1=" " ind2=" ">
   <subfield code="a">QA 76.9 A25</subfield>
   <subfield code="b">C66 2022eb</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Conklin, Arthur </subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="4">
   <subfield code="a">Principles of computer security: </subfield>
   <subfield code="b">CompTIA security+ and beyond (exam SY0-601)</subfield>
   <subfield code="c">Arthur Conklin [and four others].</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
   <subfield code="a">Sixth edition.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">New York</subfield>
   <subfield code="b">McGraw-Hill</subfield>
   <subfield code="c">[2022]</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource.</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">IP based subscription, on campus and remote access.</subfield>
   <subfield code="c">Access via Electronic Resources of the UPD Engineering Library and University Library websites.</subfield>
  </datafield>
  <datafield tag="520" ind1="0" ind2=" ">
   <subfield code="a">Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.</subfield>
  </datafield>
  <datafield tag="533" ind1=" " ind2=" ">
   <subfield code="a">Electronic reproduction</subfield>
   <subfield code="b">New York</subfield>
   <subfield code="c">McGraw-Hill</subfield>
   <subfield code="d">2022</subfield>
   <subfield code="n">Available via World Wide Web through McGraw-Hill Access Engineering.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security</subfield>
   <subfield code="x">Examinations</subfield>
   <subfield code="v">Study guides.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures</subfield>
   <subfield code="x">Examinations</subfield>
   <subfield code="8">Study guides.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer technicians</subfield>
   <subfield code="x">Certification</subfield>
   <subfield code="v">Study guides.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Electronic data processing personnel</subfield>
   <subfield code="x">Certification</subfield>
   <subfield code="v">Study guides.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Electronic books.  </subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2=" ">
   <subfield code="a">White, Gregory </subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2=" ">
   <subfield code="a">Cothren, Chuck </subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2=" ">
   <subfield code="a">Davis, Roger L. </subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2=" ">
   <subfield code="a">Williams, Dwayne </subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="z">Available for University of the Philippines Diliman via McGraw-Hill Access Engineering. Click here to access</subfield>
   <subfield code="u">https://www.accessengineeringlibrary.com/content/book/9781260474312</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DENG-II</subfield>
   <subfield code="h">QA 76.9 A25</subfield>
   <subfield code="i">C66 2022eb</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Electronic Resource</subfield>
  </datafield>
 </record>
</collection>
