Introduction to US Cybersecurity Careers. (Record no. 44382)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05188nam a22004573i 4500 |
001 - CONTROL NUMBER | |
control field | EBC1888758 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729123250.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2015 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128027431 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780128027226 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC1888758 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL1888758 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr10999512 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaONFJC)MIL679366 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)898422496 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 -- .D359 2015eb |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8023/73 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Dalziel, Henry. |
245 10 - TITLE STATEMENT | |
Title | Introduction to US Cybersecurity Careers. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | San Diego : |
Name of producer, publisher, distributor, manufacturer | Elsevier Science & Technology Books, |
Date of production, publication, distribution, manufacture, or copyright notice | 2015. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2015. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (72 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! -- 3.12 - Tip 12: participate in open-source projects -- 3.13 - Tip 13: brush up on your written skills -- 3.14 - Tip 14: attend cybersecurity conferences and volunteer -- 3.15 - Tip 15: learn Linux! -- 3.16 - Tip 16: get work experience -- 3.17 - Tip 17: government sponsored initiatives. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 4 - Networking Advice for Cybersecurity Job Seekers -- 4.1 - Using LinkedIn to secure a cybersecurity job -- 4.2 - How to identify influencers -- 4.3 - What not to do on LinkedIn -- 4.4 - Using Twitter to secure a cybersecurity job -- Chapter 5 - How to Create a Cybersecurity Resume -- 5.1 - Resume advice -- 5.1.1 - The Basics -- 5.1.2 - Making the Most of Your Skills -- 5.1.3 - Making the Most of Your Interests -- 5.1.4 - Keep Your Resume Updated -- 5.2 - Cybersecurity resume -- 5.2.1 - Federal Internship Resume Tips -- Chapter 6 - Cybersecurity Job Resources -- 6.1 - Should you do an unpaid internship? -- 6.2 - US federal internships and graduate opportunities -- Types of Internships and Opportunities -- Government Internship Opportunities with the Federal Government Intelligence Agencies -- IC Agency Employment Websites -- 6.3 - The Federal Hiring Process -- 6.4 - US private sector internships and graduate opportunities -- 6.5 - US recruitment organizations -- Chapter 7 - Interview Hacks and Tips -- 7.1 - Pitch yourself like a cyber pro by asking these questions -- 7.2 - Have anecdotes ready -- 7.3 - Be awesome to the receptionist! -- 7.4 - Organize informational interviews -- Chapter 8 - Suggested Beginner and Intermediate Cybersecurity Training and Certifications -- 8.1 - Recognized professional cybersecurity certifications -- 8.1.1 - Benefits of Certification -- 8.2 - Best schools for cybersecurity -- 8.3 - Scholarship opportunities -- Chapter 9 - Summary -- 9.1 - Wrap up and summary. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks -- Security measures -- Vocational guidance -- United States. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | National security -- Vocational guidance -- United States. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Dalziel, Henry |
Title | Introduction to US Cybersecurity Careers |
Place, publisher, and date of publication | San Diego : Elsevier Science & Technology Books,c2015 |
International Standard Book Number | 9780128027226 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1888758">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1888758</a> |
Public note | Click to View |
No items available.