The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
Autor Izzat Alsmadien Limba Engleză Hardback – 15 apr 2023
This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment.
Preț: 634.13 lei
Preț vechi: 746.03 lei
-15% Nou
Puncte Express: 951
Preț estimativ în valută:
121.37€ • 126.50$ • 101.04£
121.37€ • 126.50$ • 101.04£
Carte tipărită la comandă
Livrare economică 07-21 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031216503
ISBN-10: 3031216504
Pagini: 396
Ilustrații: XXII, 396 p. 1 illus.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.76 kg
Ediția:2nd ed. 2023
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3031216504
Pagini: 396
Ilustrații: XXII, 396 p. 1 illus.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.76 kg
Ediția:2nd ed. 2023
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Introduction.- Acquisition Management.- Continuity Planning and Disaster Recovery.- Cyber Defense Analysis and Support.- Cyber Intelligence.- Cyber Intelligence Analysis.- Cyber Operational Planning.- Cyber Policy and Strategy Management.- Cyber Threat Analysis.- Cybersecurity Management.- Forensics Analysis.- Identity Management.- Incident Response.
Recenzii
“The book will also be of value to employers, human resources (HR) departments, and hiring managers to identify and define cybersecurity roles and skills within their organizations. Individuals can also use the book to explore career prospects in cybersecurity.” (David B. Henderson, Computing Reviews, August 29, 2023)
Notă biografică
Dr. Izzat Alsmadi is an Associate Professor in the department of computing and cyber security at the Texas A&M, San Antonio. He has his master and PhD in Software Engineering from North Dakota State University. He has more than 100 conference and journal publications. His research interests include:Software security, software engineering, software testing, social networks and software defined networking. He is lead editor of Information Fusion for Cyber-Security Analytics, Alsmadi, Izzat M, Karabatis, George, Aleroud, Ahmed, Springer, 2017. The author is also a member of The National Initiative for Cybersecurity Education (NICE) group, which meets frequently to discuss enhancements on cyber security education at the national level.
Textul de pe ultima copertă
This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE framework.
This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment.
This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment.
- Updated to mirror classes set up by the US-based National Initiative for Cybersecurity Education (NICE);
- Used by universities, corporations, and in government training;
- Includes content that provides skill-based instruction.
Caracteristici
Updated to mirror classes set up by the US-based National Initiative for Cybersecurity Education (NICE) Used by universities, corporations, and in government training Includes content that provides skill-based instruction