Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Teaching Cybersecurity
A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
Taschenbuch von Daniel Shoemaker (u. a.)
Sprache: Englisch

54,40 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung

This book explains cybersecurity through a simple story rather than diving into execution details. Each chapter is geared to teaching both middle and high school audiences. The eight component areas are standalone, but the real value lies in the comprehensive but easy-to-understand picture that the reader will get of a complicated field.

This book explains cybersecurity through a simple story rather than diving into execution details. Each chapter is geared to teaching both middle and high school audiences. The eight component areas are standalone, but the real value lies in the comprehensive but easy-to-understand picture that the reader will get of a complicated field.

Über den Autor

Dan Shoemaker, PhD, is a distinguished visitor of the IEEE, full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity.

Ken Sigler is a faculty member of the Computer Information Systems (CIS) program and Chair of Curriculum Instruction at Oakland Community College in Michigan. Ken's research is in the areas of software management, software Assurance, cybersecurity management and cybersecurity education in which he has published several books and articles.

Tamara Shoemaker is Director for Cyber Security & Intelligence Studies at the University of Detroit Mercy. She spearheaded the development of two university department's community outreach and development strategy, CIS (Cyber security programs) and the Criminal Justice (CJ, and Intelligence Analysis). Tamara coordinates projects with government entities, academic organizations, industry and law enforcement agencies locally, nationally and internationally.

Inhaltsverzeichnis

1. Why You Should Read This Book, 2. Getting Down to Business: Data Security, 3. Software Security: Software Underlies Everything, 4. Component Security: It All Starts with Components, 5. Connection Security, 6. System Security: Assembling the Parts into a Useful Whole, 7. Human Security: Human-Centered Threats, 8. Organizational Security: Introduction Securing the Enterprise, 9. Societal Security: Security and Society

Über den Autor

Dan Shoemaker, PhD, is a distinguished visitor of the IEEE, full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity.

Ken Sigler is a faculty member of the Computer Information Systems (CIS) program and Chair of Curriculum Instruction at Oakland Community College in Michigan. Ken's research is in the areas of software management, software Assurance, cybersecurity management and cybersecurity education in which he has published several books and articles.

Tamara Shoemaker is Director for Cyber Security & Intelligence Studies at the University of Detroit Mercy. She spearheaded the development of two university department's community outreach and development strategy, CIS (Cyber security programs) and the Criminal Justice (CJ, and Intelligence Analysis). Tamara coordinates projects with government entities, academic organizations, industry and law enforcement agencies locally, nationally and internationally.

Inhaltsverzeichnis

1. Why You Should Read This Book, 2. Getting Down to Business: Data Security, 3. Software Security: Software Underlies Everything, 4. Component Security: It All Starts with Components, 5. Connection Security, 6. System Security: Assembling the Parts into a Useful Whole, 7. Human Security: Human-Centered Threats, 8. Organizational Security: Introduction Securing the Enterprise, 9. Societal Security: Security and Society

Warnhinweis

Ähnliche Produkte

Ähnliche Produkte