000 | 03398nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-030-02360-7 | ||
003 | DE-He213 | ||
005 | 20220801214144.0 | ||
007 | cr nn 008mamaa | ||
008 | 190124s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030023607 _9978-3-030-02360-7 |
||
024 | 7 |
_a10.1007/978-3-030-02360-7 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aAlsmadi, Izzat. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _936650 |
|
245 | 1 | 4 |
_aThe NICE Cyber Security Framework _h[electronic resource] : _bCyber Security Intelligence and Analytics / _cby Izzat Alsmadi. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXX, 354 p. 192 illus., 153 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response. | |
520 | _aThis textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
650 | 2 | 4 |
_aComputer Communication Networks. _936651 |
710 | 2 |
_aSpringerLink (Online service) _936652 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030023591 |
776 | 0 | 8 |
_iPrinted edition: _z9783030023614 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-02360-7 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c76020 _d76020 |