ORPP logo

Introduction to US Cybersecurity Careers. (Record no. 44382)

MARC details
000 -LEADER
fixed length control field 05188nam a22004573i 4500
001 - CONTROL NUMBER
control field EBC1888758
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729123250.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2015 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128027431
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128027226
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC1888758
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL1888758
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10999512
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL679366
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)898422496
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59 -- .D359 2015eb
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8023/73
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Dalziel, Henry.
245 10 - TITLE STATEMENT
Title Introduction to US Cybersecurity Careers.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Diego :
Name of producer, publisher, distributor, manufacturer Elsevier Science & Technology Books,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (72 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! -- 3.12 - Tip 12: participate in open-source projects -- 3.13 - Tip 13: brush up on your written skills -- 3.14 - Tip 14: attend cybersecurity conferences and volunteer -- 3.15 - Tip 15: learn Linux! -- 3.16 - Tip 16: get work experience -- 3.17 - Tip 17: government sponsored initiatives.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 4 - Networking Advice for Cybersecurity Job Seekers -- 4.1 - Using LinkedIn to secure a cybersecurity job -- 4.2 - How to identify influencers -- 4.3 - What not to do on LinkedIn -- 4.4 - Using Twitter to secure a cybersecurity job -- Chapter 5 - How to Create a Cybersecurity Resume -- 5.1 - Resume advice -- 5.1.1 - The Basics -- 5.1.2 - Making the Most of Your Skills -- 5.1.3 - Making the Most of Your Interests -- 5.1.4 - Keep Your Resume Updated -- 5.2 - Cybersecurity resume -- 5.2.1 - Federal Internship Resume Tips -- Chapter 6 - Cybersecurity Job Resources -- 6.1 - Should you do an unpaid internship? -- 6.2 - US federal internships and graduate opportunities -- Types of Internships and Opportunities -- Government Internship Opportunities with the Federal Government Intelligence Agencies -- IC Agency Employment Websites -- 6.3 - The Federal Hiring Process -- 6.4 - US private sector internships and graduate opportunities -- 6.5 - US recruitment organizations -- Chapter 7 - Interview Hacks and Tips -- 7.1 - Pitch yourself like a cyber pro by asking these questions -- 7.2 - Have anecdotes ready -- 7.3 - Be awesome to the receptionist! -- 7.4 - Organize informational interviews -- Chapter 8 - Suggested Beginner and Intermediate Cybersecurity Training and Certifications -- 8.1 - Recognized professional cybersecurity certifications -- 8.1.1 - Benefits of Certification -- 8.2 - Best schools for cybersecurity -- 8.3 - Scholarship opportunities -- Chapter 9 - Summary -- 9.1 - Wrap up and summary.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks -- Security measures -- Vocational guidance -- United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element National security -- Vocational guidance -- United States.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Dalziel, Henry
Title Introduction to US Cybersecurity Careers
Place, publisher, and date of publication San Diego : Elsevier Science & Technology Books,c2015
International Standard Book Number 9780128027226
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1888758">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1888758</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.