LEADER 00909cam1-22003251i-450- 001 990003937330403321 005 20080214122316.0 035 $a000393733 035 $aFED01000393733 035 $a(Aleph)000393733FED01 035 $a000393733 100 $a20030910d2002----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aa---a---011yy 200 1 $aStudi in ricordo di Guido Barbina 210 $aUdine$cForum$d2002 215 $a2 v.$d24 cm 463 \1$1001990003937340403321$12001 $aEst Ovest$elingue, stili, società 610 0 $aSottosviluppo africano$aImmigrazione in Friuli 676 $a010.011 702 1$aBarbina,$bGuido$f<1936-1999> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003937330403321 952 $a010.011.BIA$fDECGE 959 $aDECGE 959 $aILFGE 996 $aStudi in ricordo di Guido Barbina$9511285 997 $aUNINA LEADER 03602nam 22005775 450 001 9910392739803321 005 20251116224236.0 010 $a3-030-41987-8 024 7 $a10.1007/978-3-030-41987-5 035 $a(CKB)4100000011223453 035 $a(MiAaPQ)EBC6178526 035 $a(DE-He213)978-3-030-41987-5 035 $a(PPN)243763794 035 $a(EXLCZ)994100000011223453 100 $a20200420d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe NICE Cyber Security Framework $eCyber Security Management /$fby Izzat Alsmadi, Chuck Easttom, Lo?ai Tawalbeh 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (271 pages) 300 $aIncludes index. 311 08$a3-030-41986-X 327 $aIntroduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion. 330 $aThis textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more. 606 $aElectrical engineering 606 $aSystem safety 606 $aComputers 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aElectrical engineering. 615 0$aSystem safety. 615 0$aComputers. 615 14$aCommunications Engineering, Networks. 615 24$aSecurity Science and Technology. 615 24$aInformation Systems and Communication Service. 676 $a005.8 700 $aAlsmadi$b Izzat$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875246 702 $aEasttom$b Chuck$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTawalbeh$b Lo?ai$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910392739803321 996 $aThe NICE Cyber Security Framework$91954033 997 $aUNINA