| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996383953003316 |
|
|
Autore |
Jones Bassett |
|
|
Titolo |
Herm'ælogium [[electronic resource] ] : or, an essay at the rationality of the art of speaking. As a supplement to Lillie's grammer, philosophically, mythologically, & emblematically offered by B.J |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, : Printed by R.W. for T. Fasset, in St. Dunstans-Church-yard in Fleet-street, 1659 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
English language - Grammar |
Latin language - Grammar |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
The first leaf is blank. |
Advertisement leaf and errata leaf proceed text. |
Thomason copy cut off at p. 94. |
Annotation on Thomason copy: "Au:". |
Reproduction of the original in the British Library. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910299574103321 |
|
|
Autore |
Alsmadi Izzat |
|
|
Titolo |
Practical Information Security : A Competency-Based Education Course / / by Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud , Abdallah Wahbeh, Mahmoud Al-Qudah, Ahmad Al-Omari |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2018.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 314 p. 185 illus., 144 illus. in color.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electrical engineering |
Computer security |
System safety |
Application software |
Communications Engineering, Networks |
Systems and Data Security |
Security Science and Technology |
Information Systems Applications (incl. Internet) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. Compliance Laws -- Conclusion. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; |
|
|
|
|
|
|
|
|
|
|
safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don’t specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development. |
|
|
|
|
|
| |