Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
¿Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) | Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training | Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
¿Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Dr. Izzat Alsmadi is an Assistant Professor in the department of computing and cyber security at the Texas A&M, San Antonio. He has his master and PhD in Software Engineering from North Dakota State University. He has more than 100 conference and journal publications. His research interests include: Software security, software engineering, software testing, social networks and software defined networking. He is lead editor of Information Fusion for Cyber-Security Analytics, Alsmadi, Izzat M, Karabatis, George, Aleroud, Ahmed, Springer, 2017. The author is also a member of The National Initiative for Cybersecurity Education (NICE) group, which meets frequently to discuss enhancements on cyber security education at the national level.
Inhaltsangabe
Introduction.- Information Assurance / Encryption.- Information Systems Security Management.- IT Risk and Security Management.- Criminal Law.- Network Management.- Risk Management.- Software Management.- System Administration.- System Architecture.- Threat Analysis.- Training, Education, and Awareness.- Conclusion.
Introduction.- Information Assurance / Encryption.- Information Systems Security Management.- IT Risk and Security Management.- Criminal Law.- Network Management.- Risk Management.- Software Management.- System Administration.- System Architecture.- Threat Analysis.- Training, Education, and Awareness.- Conclusion.
Rezensionen
"The book will also be of value to employers, human resources (HR) departments, and hiring managers to identify and define cybersecurity roles and skills within their organizations. Individuals can also use the book to explore career prospects in cybersecurity." (David B. Henderson, Computing Reviews, August 29, 2023)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826