000 03581nam a22005415i 4500
001 978-3-030-41987-5
003 DE-He213
005 20220801215549.0
007 cr nn 008mamaa
008 200420s2020 sz | s |||| 0|eng d
020 _a9783030419875
_9978-3-030-41987-5
024 7 _a10.1007/978-3-030-41987-5
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aAlsmadi, Izzat.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_945128
245 1 4 _aThe NICE Cyber Security Framework
_h[electronic resource] :
_bCyber Security Management /
_cby Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXV, 262 p. 84 illus., 73 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion.
520 _aThis textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more.
650 0 _aTelecommunication.
_910437
650 0 _aSecurity systems.
_931879
650 0 _aComputer networks .
_931572
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aSecurity Science and Technology.
_931884
650 2 4 _aComputer Communication Networks.
_945129
700 1 _aEasttom, Chuck.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_945130
700 1 _aTawalbeh, Lo’ai.
_eauthor.
_0(orcid)0000-0002-2294-9829
_1https://orcid.org/0000-0002-2294-9829
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_945131
710 2 _aSpringerLink (Online service)
_945132
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030419868
776 0 8 _iPrinted edition:
_z9783030419882
776 0 8 _iPrinted edition:
_z9783030419899
856 4 0 _uhttps://doi.org/10.1007/978-3-030-41987-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c77624
_d77624