HOME > 상세정보

상세정보

The NICE cyber security framework : cyber security intelligence and analytics

The NICE cyber security framework : cyber security intelligence and analytics (1회 대출)

자료유형
단행본
개인저자
Alsmadi, Izzat.
서명 / 저자사항
The NICE cyber security framework : cyber security intelligence and analytics / Izzat Alsmadi.
발행사항
Cham, Switzerland :   Springer,   2019.  
형태사항
xx, 354 p. ; 25 cm.
ISBN
9783030023591
내용주기
Introduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.
서지주기
Includes bibliographical references and index.
일반주제명
Computer security. Computer networks --Security measures.
000 00000nam u2200205 a 4500
001 000046012736
005 20200116105555
008 200110s2019 sz b 001 0 eng d
020 ▼a 9783030023591
040 ▼a 211009 ▼c 211009 ▼d 211009
082 0 4 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b A461n
100 1 ▼a Alsmadi, Izzat.
245 1 4 ▼a The NICE cyber security framework : ▼b cyber security intelligence and analytics / ▼c Izzat Alsmadi.
260 ▼a Cham, Switzerland : ▼b Springer, ▼c 2019.
300 ▼a xx, 354 p. ; ▼c 25 cm.
504 ▼a Includes bibliographical references and index.
505 0 ▼a Introduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.
650 0 ▼a Computer security.
650 0 ▼a Computer networks ▼x Security measures.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 A461n 등록번호 121251836 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.

  • Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) 
  • Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
  • Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more


New feature

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
  • Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) 
  • Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
  • Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more



정보제공 : Aladin

목차

Introduction.- Acquisition Management.- Continuity Planning and Disaster Recovery.- Cyber Defense Analysis and Support.- Cyber Intelligence.- Cyber Intelligence Analysis.- Cyber Operational Planning.- Cyber Policy and Strategy Management.- Cyber Threat Analysis.- Cybersecurity Management.- Forensics Analysis.- Identity Management.- Incident Response.

관련분야 신착자료

Harvard Business Review (2025)