Practical Information Security (Record no. 79443)

000 -LEADER
fixed length control field 04377nam a22006015i 4500
001 - CONTROL NUMBER
control field 978-3-319-72119-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801221232.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180130s2018 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319721194
-- 978-3-319-72119-4
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Alsmadi, Izzat.
245 10 - TITLE STATEMENT
Title Practical Information Security
Sub Title A Competency-Based Education Course /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2018.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 317 p. 193 illus., 142 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. Compliance Laws -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don’t specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.
700 1# - AUTHOR 2
Author 2 Burdwell, Robert.
700 1# - AUTHOR 2
Author 2 Aleroud , Ahmed.
700 1# - AUTHOR 2
Author 2 Wahbeh, Abdallah.
700 1# - AUTHOR 2
Author 2 Al-Qudah, Mahmoud.
700 1# - AUTHOR 2
Author 2 Al-Omari, Ahmad.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-72119-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2018.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Application software.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Science and Technology.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer and Information Systems Applications.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.