|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996385317503316 |
|
|
Autore |
Woodhouse John |
|
|
Titolo |
Woodhouse, 1680 [[electronic resource] ] : a new almanack for the year of Lord, 1680, being the bissextile or leap-year and from the worlds creation, 5643 : wherein is contained a brief description of the four quarters of the year, excellent notes of husbandry and gardening, for every moneth in the year : with the names of all the principal fairs, and a description of the high-ways in England and Wales / / by John Woodhouse . |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, : Printed by R.E. for the Company of Stationers, 1680 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Almanacs, English |
Astrology |
Ephemerides |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Reproduction of original in Bodleian Library. |
Running title: "Woodhouse, 1680". |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910392739803321 |
|
|
Autore |
Alsmadi Izzat |
|
|
Titolo |
The NICE Cyber Security Framework : Cyber Security Management / / by Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (271 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electrical engineering |
System safety |
Computers |
Communications Engineering, Networks |
Security Science and Technology |
Information Systems and Communication Service |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology |
|
|
|
|
|
|
|
|
|
|
Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more. |
|
|
|
|
|
| |