LEADER 01035nam0 22002771i 450 001 SUN0026920 005 20050301120000.0 010 $a88-7890-330-2 100 $a20041029d1999 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aLezioni di matematica generale$fFabrizio Cacciafesta 210 $aRoma$cKappa$d1999 215 $aVIII, 489 p.$d24 cm. 606 $aMatematica$2FI$3SUNC007745 620 $dRoma$3SUNL000360 676 $a510$cMatematica$v21 700 1$aCacciafesta$b, Fabrizio$3SUNV022426$0479284 712 $aKappa$3SUNV000033$4650 801 $aIT$bSOL$c20181109$gRICA 912 $aSUN0026920 950 $aBIBLIOTECA DEL DIPARTIMENTO DI ARCHITETTURA E DISEGNO INDUSTRIALE$d01 PREST IIIAa282 $e01 27585 995 $aBIBLIOTECA DEL DIPARTIMENTO DI ARCHITETTURA E DISEGNO INDUSTRIALE$bIT-CE0107$h27585$kPREST IIIAa282$op$qa 996 $aLezioni di matematica generale$91432168 997 $aUNICAMPANIA LEADER 01959nas 2200409 n 450 001 990008921500403321 005 20240229084534.0 011 $a0393-4683 035 $a000892150 035 $aFED01000892150 035 $a(Aleph)000892150FED01 035 $a000892150 091 $2CNR$aP 00015848 100 $a20090724b18861942km-y0itaa50------ba 101 0 $aita 102 $aIT 110 $aauu-------- 200 1 $aBollettino dei Musei di zoologia e anatomia comparata della R. Università di Torino 207 1$a1886-1942 210 $aTorino$cMuseo di zoologia 440 0$1001000892242$12001$aBollettino dell'Istituto e Museo di Zoologia dell'Università di Torino 530 0 $aBollettino dei Musei di zoologia e anatomia comparata della R. Università di Torino 675 $a59 675 $a611-019 675 $a591 712 02$aUniversità degli studi di Torino.$bMuseo di zoologia 712 02$aUniversità degli studi di Torino.$bMuseo di anatomia comparata 801 0$aIT$bACNP$c20090723 859 4 $uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/dc-p1.tcl?catno=8489&person=false&language=ITALIANO&libr=&libr_th=unina1$zBiblioteche che possiedono il periodico 901 $aSE 912 $a990008921500403321 958 $aBiblioteca del Dipartimento di Entomologia e Zoologia Agraria dell'Università degli Studi di Napoli Federico II$b1894-1942.$fDAGEN 959 $aDAGEN 996 $aBollettino dei Musei di zoologia e anatomia comparata della R. Università di Torino$9799079 997 $aUNINA AP1 8 $6866-01$aNA219 Biblioteca del Dipartimento di Entomologia e Zoologia Agraria dell'Università degli Studi di Napoli Federico II$eVia Università, 100, 80055 Portici (NA)$m0812539188$m0817755145$nit AP2 40$aacnp.cib.unibo.it$nACNP Italian Union Catalogue of Serials$uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/df-p.tcl?catno=8489&language=ITALIANO&libr=&person=&B=1&libr_th=unina&proposto=NO LEADER 04703nam 22006975 450 001 9910299574103321 005 20200703152828.0 010 $a3-319-72119-4 024 7 $a10.1007/978-3-319-72119-4 035 $a(CKB)4100000001794698 035 $a(DE-He213)978-3-319-72119-4 035 $a(MiAaPQ)EBC6315036 035 $a(MiAaPQ)EBC5589196 035 $a(Au-PeEL)EBL5589196 035 $a(OCoLC)1021192214 035 $a(PPN)223958182 035 $a(EXLCZ)994100000001794698 100 $a20180130d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPractical Information Security $eA Competency-Based Education Course /$fby Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud , Abdallah Wahbeh, Mahmoud Al-Qudah, Ahmad Al-Omari 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIII, 314 p. 185 illus., 144 illus. in color.) 300 $aIncludes index. 311 $a3-319-72118-6 327 $aIntroduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. Compliance Laws -- Conclusion. 330 $aThis textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don?t specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development. 606 $aElectrical engineering 606 $aComputer security 606 $aSystem safety 606 $aApplication software 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aElectrical engineering. 615 0$aComputer security. 615 0$aSystem safety. 615 0$aApplication software. 615 14$aCommunications Engineering, Networks. 615 24$aSystems and Data Security. 615 24$aSecurity Science and Technology. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 700 $aAlsmadi$b Izzat$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875246 702 $aBurdwell$b Robert$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAleroud $b Ahmed$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWahbeh$b Abdallah$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAl-Qudah$b Mahmoud$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAl-Omari$b Ahmad$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299574103321 996 $aPractical Information Security$92512077 997 $aUNINA