000 03398nam a22005295i 4500
001 978-3-030-02360-7
003 DE-He213
005 20220801214144.0
007 cr nn 008mamaa
008 190124s2019 sz | s |||| 0|eng d
020 _a9783030023607
_9978-3-030-02360-7
024 7 _a10.1007/978-3-030-02360-7
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aAlsmadi, Izzat.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_936650
245 1 4 _aThe NICE Cyber Security Framework
_h[electronic resource] :
_bCyber Security Intelligence and Analytics /
_cby Izzat Alsmadi.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXX, 354 p. 192 illus., 153 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.
520 _aThis textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aSecurity systems.
_931879
650 0 _aComputer networks .
_931572
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Science and Technology.
_931884
650 2 4 _aComputer Communication Networks.
_936651
710 2 _aSpringerLink (Online service)
_936652
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030023591
776 0 8 _iPrinted edition:
_z9783030023614
856 4 0 _uhttps://doi.org/10.1007/978-3-030-02360-7
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76020
_d76020