Dan Shoemaker (University of Detroit Mercy), Wm. Conklin (University of Houston)
Cybersecurity
The Essential Body Of Knowledge
Dan Shoemaker (University of Detroit Mercy), Wm. Conklin (University of Houston)
Cybersecurity
The Essential Body Of Knowledge
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Provides a comprehensive framework of practices for assuring information security, told through a real-world story and based on the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security.
Andere Kunden interessierten sich auch für
- Nicholas SherwoodEnterprise Security Architecture140,99 €
- Nicholas SherwoodEnterprise Security Architecture73,99 €
- Paul A. WattersCybercrime and Cybersecurity100,99 €
- Security Engineering for Embedded and Cyber-Physical Systems55,99 €
- David W. WangReaching Your New Digital Heights57,99 €
- Kevin Lynn McLaughlinCybersecurity Operations and Fusion Centers61,99 €
- Paul A. WattersCybercrime and Cybersecurity41,99 €
-
-
-
Provides a comprehensive framework of practices for assuring information security, told through a real-world story and based on the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security.
Produktdetails
- Produktdetails
- Verlag: Cengage Learning EMEA / Delmar
- New ed
- Seitenzahl: 528
- Erscheinungstermin: 17. Mai 2011
- Englisch
- Abmessung: 231mm x 188mm x 20mm
- Gewicht: 768g
- ISBN-13: 9781435481695
- ISBN-10: 1435481690
- Artikelnr.: 33582480
- Verlag: Cengage Learning EMEA / Delmar
- New ed
- Seitenzahl: 528
- Erscheinungstermin: 17. Mai 2011
- Englisch
- Abmessung: 231mm x 188mm x 20mm
- Gewicht: 768g
- ISBN-13: 9781435481695
- ISBN-10: 1435481690
- Artikelnr.: 33582480
Dan Shoemaker is a professor and senior research scientist at the Center for Cyber Security and Intelligence Studies--a National Security Agency (NSA) Center of Academic Excellence--at the University of Detroit Mercy (UDM). He also served as chair of the Computer and Information Systems Department at UDM for 25 years and holds a visiting appointment at London South Bank University. Dr. Shoemaker is co-chair of the Software Assurance Workforce Training and Education working group within the Department of Homeland Security's National Cybersecurity Division (NCSD). He has also served the NCSD as a member of the working group that developed its Essential Body of Knowledge, and as an expert panelist on three national working groups. A prolific author, Dr. Shoemaker is one of three domain editors for the Software Assurance Common Body of Knowledge. He lectures internationally on cybersecurity, information assurance, and software engineering topics, and he founded the International Cyber
security Education Coalition (ICSEC) to connect higher education institutions and expand teaching of standard information assurance curricula throughout the Midwest. Dr. Shoemaker is the recipient of the Michigan Homeland Security annual Statewide award for Educators (2007).
security Education Coalition (ICSEC) to connect higher education institutions and expand teaching of standard information assurance curricula throughout the Midwest. Dr. Shoemaker is the recipient of the Michigan Homeland Security annual Statewide award for Educators (2007).
Section I: BACKGROUND. 1. The Field of Cyber Security. 2. The DHS EBK Initiative. 3. Applying the EBK. Section II: EBK ROLES AND REQUIRED CAPABILITIES. 4. The Executive role. 5. The Functional role. 6. The Corollary role. Section II: THE 14 AREAS OF INFORMATION SECURITY. 7. Data Security. 8. Digital Forensics. 9. Enterprise Continuity. 10. Incident Management. 11. IT Security Training and Awareness. 12. IT Systems Operations and Maintenance. 13. Network and Telecommunications Security. 14. Personnel Security. 15. Physical and Environmental Security. 16. Procurement. 17. Regulatory and Standards Compliance. 18. Security Risk Management. 19. Strategic Security Management. 20. System and Application Security.
Section I: BACKGROUND. 1. The Field of Cyber Security. 2. The DHS EBK Initiative. 3. Applying the EBK. Section II: EBK ROLES AND REQUIRED CAPABILITIES. 4. The Executive role. 5. The Functional role. 6. The Corollary role. Section II: THE 14 AREAS OF INFORMATION SECURITY. 7. Data Security. 8. Digital Forensics. 9. Enterprise Continuity. 10. Incident Management. 11. IT Security Training and Awareness. 12. IT Systems Operations and Maintenance. 13. Network and Telecommunications Security. 14. Personnel Security. 15. Physical and Environmental Security. 16. Procurement. 17. Regulatory and Standards Compliance. 18. Security Risk Management. 19. Strategic Security Management. 20. System and Application Security.