Mastering Advanced Excel (Record no. 98694)

MARC details
000 -LEADER
fixed length control field 02487 a2200169 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240801b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789355518651
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 001.64
Cutter ARO
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Arora Ritu
245 ## - TITLE STATEMENT
Title Mastering Advanced Excel
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc BPB Publications
Date of publication, distribution, etc 2023
Place of publication, distribution, etc New Delhi
300 ## - PHYSICAL DESCRIPTION
Extent 564
520 ## - Remark
Summary, etc Description<br/>Once a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks, Intellectual Property thefts, and others.<br/><br/>This book will help and guide the readers through the process of creating and integrating a secure cyber ecosystem into their digital business operations. In addition, it will help readers safeguard and defend the IT security infrastructure by implementing the numerous tried-and-tested procedures outlined in this book.<br/><br/>The tactics covered in this book provide a moderate introduction to defensive and offensive strategies, and they are supported by recent and popular use-cases on cyberattacks. The book provides a well-illustrated introduction to a set of methods for protecting the system from vulnerabilities and expert-led measures for initiating various urgent steps after an attack has been detected.<br/>What you will learn<br/>● Adopt MITRE ATT&CK and MITRE framework and examine NIST, ITIL, and ISMS recommendations.<br/>● Understand all forms of vulnerabilities, application security mechanisms, and deployment strategies.<br/>● Know-how of Cloud Security Posture Management (CSPM), Threat Intelligence, and modern SIEM systems.<br/>● Learn security gap analysis, Cybersecurity planning, and strategy monitoring.<br/>Who this book is for<br/>Professionals in IT security, Cybersecurity, and other related fields working to improve the organization's overall security will find this book a valuable resource and companion.<br/>This book will guide young professionals who are planning to enter Cybersecurity with the right set of skills and knowledge.<br/><br/>Source: https://www.amazon.in/Modern-Cybersecurity-Strategies-Enterprises-Enterprise/dp/9355513135/ref=sr_1_1?crid=3US95B3WEVGU5&dib=eyJ2IjoiMSJ9.FBCsRsgr4DJcVRKL20Sttw.LKOCzPxLMxaeYrU952X4T5NRCslauigo7uuScStc4t4&dib_tag=se&keywords=9789355513137&qid=1722520988&sprefix=9789355510655%2Caps%2C260&sr=8-1
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Advanced Excel
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a Information Technology
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Item type Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Collection Type Full call number Barcode Date last seen Cost, replacement price Koha item type
    Dewey Decimal Classification     Reference book Main Library Main Library Information Technology 10/07/2024 Shanti Book 396.00 Indian Book 001.64 ARO 119451 10/07/2024 495.00 Book

Powered by Koha