Practical Information Security A Competency-Based Education Course /

This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a b...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Alsmadi, Izzat (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Burdwell, Robert (http://id.loc.gov/vocabulary/relators/aut), Aleroud , Ahmed (http://id.loc.gov/vocabulary/relators/aut), Wahbeh, Abdallah (http://id.loc.gov/vocabulary/relators/aut), Al-Qudah, Mahmoud (http://id.loc.gov/vocabulary/relators/aut), Al-Omari, Ahmad (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04459nam a2200565 4500
001 978-3-319-72119-4
003 DE-He213
005 20191220125316.0
007 cr nn 008mamaa
008 180130s2018 gw | s |||| 0|eng d
020 |a 9783319721194  |9 978-3-319-72119-4 
024 7 |a 10.1007/978-3-319-72119-4  |2 doi 
040 |d GrThAP 
050 4 |a TK1-9971 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
072 7 |a TJK  |2 thema 
082 0 4 |a 621.382  |2 23 
100 1 |a Alsmadi, Izzat.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Practical Information Security  |h [electronic resource] :  |b A Competency-Based Education Course /  |c by Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud , Abdallah Wahbeh, Mahmoud Al-Qudah, Ahmad Al-Omari. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XIII, 317 p. 193 illus., 142 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. Compliance Laws -- Conclusion. 
520 |a This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don't specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development. 
650 0 |a Electrical engineering. 
650 0 |a Computer security. 
650 0 |a System safety. 
650 0 |a Application software. 
650 1 4 |a Communications Engineering, Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Security Science and Technology.  |0 http://scigraph.springernature.com/things/product-market-codes/P31080 
650 2 4 |a Information Systems Applications (incl. Internet).  |0 http://scigraph.springernature.com/things/product-market-codes/I18040 
700 1 |a Burdwell, Robert.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Aleroud , Ahmed.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Wahbeh, Abdallah.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Al-Qudah, Mahmoud.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Al-Omari, Ahmad.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319721187 
776 0 8 |i Printed edition:  |z 9783319721200 
776 0 8 |i Printed edition:  |z 9783319891439 
856 4 0 |u https://doi.org/10.1007/978-3-319-72119-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)