LEADER 03602nam 22005775 450 001 9910392739803321 005 20200701112755.0 010 $a3-030-41987-8 024 7 $a10.1007/978-3-030-41987-5 035 $a(CKB)4100000011223453 035 $a(MiAaPQ)EBC6178526 035 $a(DE-He213)978-3-030-41987-5 035 $a(PPN)243763794 035 $a(EXLCZ)994100000011223453 100 $a20200420d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe NICE Cyber Security Framework $eCyber Security Management /$fby Izzat Alsmadi, Chuck Easttom, Lo?ai Tawalbeh 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (271 pages) 300 $aIncludes index. 311 $a3-030-41986-X 327 $aIntroduction -- Information Assurance / Encryption -- Information Systems Security Management -- IT Risk and Security Management -- Criminal Law -- Network Management -- Risk Management -- Software Management -- System Administration -- System Architecture -- Threat Analysis -- Training, Education, and Awareness -- Conclusion. 330 $aThis textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more. 606 $aElectrical engineering 606 $aSystem safety 606 $aComputers 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aElectrical engineering. 615 0$aSystem safety. 615 0$aComputers. 615 14$aCommunications Engineering, Networks. 615 24$aSecurity Science and Technology. 615 24$aInformation Systems and Communication Service. 676 $a005.8 700 $aAlsmadi$b Izzat$4aut$4http://id.loc.gov/vocabulary/relators/aut$0875246 702 $aEasttom$b Chuck$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTawalbeh$b Lo?ai$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910392739803321 996 $aThe NICE Cyber Security Framework$91954033 997 $aUNINA