000 | 03581nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-030-41987-5 | ||
003 | DE-He213 | ||
005 | 20220801215549.0 | ||
007 | cr nn 008mamaa | ||
008 | 200420s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030419875 _9978-3-030-41987-5 |
||
024 | 7 |
_a10.1007/978-3-030-41987-5 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aAlsmadi, Izzat. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _945128 |
|
245 | 1 | 4 |
_aThe NICE Cyber Security Framework _h[electronic resource] : _bCyber Security Management / _cby Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXV, 262 p. 84 illus., 73 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion. | |
520 | _aThis textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
650 | 2 | 4 |
_aComputer Communication Networks. _945129 |
700 | 1 |
_aEasttom, Chuck. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _945130 |
|
700 | 1 |
_aTawalbeh, Lo’ai. _eauthor. _0(orcid)0000-0002-2294-9829 _1https://orcid.org/0000-0002-2294-9829 _4aut _4http://id.loc.gov/vocabulary/relators/aut _945131 |
|
710 | 2 |
_aSpringerLink (Online service) _945132 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030419868 |
776 | 0 | 8 |
_iPrinted edition: _z9783030419882 |
776 | 0 | 8 |
_iPrinted edition: _z9783030419899 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-41987-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c77624 _d77624 |