000931878 000__ 02660cam\a2200445Ia\4500 000931878 001__ 931878 000931878 005__ 20230306151604.0 000931878 006__ m\\\\\o\\d\\\\\\\\ 000931878 007__ cr\un\nnnunnun 000931878 008__ 200504s2020\\\\sz\\\\\\o\\\\\001\0\eng\d 000931878 019__ $$a1152068452$$a1152536936$$a1153156167 000931878 020__ $$a9783030419875$$q(electronic book) 000931878 020__ $$a3030419878$$q(electronic book) 000931878 020__ $$z303041986X 000931878 020__ $$z9783030419868 000931878 0247_ $$a10.1007/978-3-030-41 000931878 035__ $$aSP(OCoLC)on1153066198 000931878 035__ $$aSP(OCoLC)1153066198$$z(OCoLC)1152068452$$z(OCoLC)1152536936$$z(OCoLC)1153156167 000931878 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dEBLCP$$dLQU 000931878 049__ $$aISEA 000931878 050_4 $$aQA76.9.A25 000931878 08204 $$a005.8$$223 000931878 1001_ $$aAlsmadi, Izzat,$$d1972- 000931878 24514 $$aThe NICE cyber security framework :$$bcyber security management /$$cIzzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh. 000931878 260__ $$aCham :$$bSpringer,$$c2020. 000931878 300__ $$a1 online resource 000931878 336__ $$atext$$btxt$$2rdacontent 000931878 337__ $$acomputer$$bc$$2rdamedia 000931878 338__ $$aonline resource$$bcr$$2rdacarrier 000931878 500__ $$aIncludes index. 000931878 506__ $$aAccess limited to authorized users. 000931878 520__ $$aThis textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and abilities. The author demonstrates knowledge and skills material in information security, giving readers immediate applicable skills throughout the text. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Provides skill based instruction on information assurance, information systems, IT management, criminal law, and more. 000931878 650_0 $$aComputer security$$xManagement. 000931878 7001_ $$aEasttom, Chuck. 000931878 7001_ $$aTawalbeh, Lo'ai. 000931878 77608 $$iPrint version: $$z303041986X$$z9783030419868$$w(OCoLC)1138494584 000931878 852__ $$bebk 000931878 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-41987-5$$zOnline Access$$91397441.1 000931878 909CO $$ooai:library.usi.edu:931878$$pGLOBAL_SET 000931878 980__ $$aEBOOK 000931878 980__ $$aBIB 000931878 982__ $$aEbook 000931878 983__ $$aOnline 000931878 994__ $$a92$$bISE