Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The NICE cyber security framework = ...
~
Alsmadi, Izzat.
Linked to FindBook
Google Book
Amazon
博客來
The NICE cyber security framework = cyber security management /
Record Type:
Electronic resources : Monograph/item
Title/Author:
The NICE cyber security framework/ by Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh.
Reminder of title:
cyber security management /
Author:
Alsmadi, Izzat.
other author:
Easttom, Chuck.
Published:
Cham :Springer International Publishing : : 2020.,
Description:
xv, 262 p. :ill., digital ;24 cm.
[NT 15003449]:
Introduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion.
Contained By:
Springer eBooks
Subject:
Computer security - Management. -
Online resource:
https://doi.org/10.1007/978-3-030-41987-5
ISBN:
9783030419875
The NICE cyber security framework = cyber security management /
Alsmadi, Izzat.
The NICE cyber security framework
cyber security management /[electronic resource] :by Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh. - Cham :Springer International Publishing :2020. - xv, 262 p. :ill., digital ;24 cm.
Introduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion.
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more.
ISBN: 9783030419875
Standard No.: 10.1007/978-3-030-41987-5doiSubjects--Topical Terms:
590469
Computer security
--Management.
LC Class. No.: QA76.9.A25 / A476 2020
Dewey Class. No.: 005.8
The NICE cyber security framework = cyber security management /
LDR
:02446nmm a2200325 a 4500
001
2217825
003
DE-He213
005
20200814111346.0
006
m d
007
cr nn 008maaau
008
201120s2020 sz s 0 eng d
020
$a
9783030419875
$q
(electronic bk.)
020
$a
9783030419868
$q
(paper)
024
7
$a
10.1007/978-3-030-41987-5
$2
doi
035
$a
978-3-030-41987-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A476 2020
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A461 2020
100
1
$a
Alsmadi, Izzat.
$3
3300985
245
1 4
$a
The NICE cyber security framework
$h
[electronic resource] :
$b
cyber security management /
$c
by Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xv, 262 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion.
520
$a
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more.
650
0
$a
Computer security
$x
Management.
$3
590469
650
1 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Security Science and Technology.
$3
1531662
650
2 4
$a
Information Systems and Communication Service.
$3
891044
700
1
$a
Easttom, Chuck.
$3
824055
700
1
$a
Tawalbeh, Lo'ai.
$3
3451357
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-41987-5
950
$a
Engineering (Springer-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9392729
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A476 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login