000 | 03464nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-031-21651-0 | ||
003 | DE-He213 | ||
005 | 20240207153601.0 | ||
007 | cr nn 008mamaa | ||
008 | 230413s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031216510 _9978-3-031-21651-0 |
||
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aAlsmadi, Izzat. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 4 |
_aThe NICE Cyber Security Framework _h[electronic resource] : _bCyber Security Intelligence and Analytics / _cby Izzat Alsmadi. |
250 | _a2nd ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXXII, 396 p. 1 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
500 | _aAcceso multiusuario | ||
505 | 0 | _aIntroduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response. | |
520 | _aThis updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE framework. This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment. Updated to mirror classes set up by the US-based National Initiative for Cybersecurity Education (NICE); Used by universities, corporations, and in government training; Includes content that provides skill-based instruction. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aTelecommunication. | |
650 | 0 | _aData protection. | |
650 | 0 | _aSecurity systems. | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aSecurity Science and Technology. |
650 | 2 | 4 | _aComputer Communication Networks. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031216503 |
776 | 0 | 8 |
_iPrinted edition: _z9783031216527 |
776 | 0 | 8 |
_iPrinted edition: _z9783031216534 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-21651-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c261580 _d261579 |