This book explains cybersecurity through a simple story rather than diving into execution details. Each chapter is geared to teaching both middle and high school audiences. The eight component areas are standalone, but the real value lies in the comprehensive but easy-to-understand picture that the reader will get of a complicated field.
This book explains cybersecurity through a simple story rather than diving into execution details. Each chapter is geared to teaching both middle and high school audiences. The eight component areas are standalone, but the real value lies in the comprehensive but easy-to-understand picture that the reader will get of a complicated field.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dan Shoemaker, PhD, is a distinguished visitor of the IEEE, full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Ken Sigler is a faculty member of the Computer Information Systems (CIS) program and Chair of Curriculum Instruction at Oakland Community College in Michigan. Ken's research is in the areas of software management, software Assurance, cybersecurity management and cybersecurity education in which he has published several books and articles. Tamara Shoemaker is Director for Cyber Security & Intelligence Studies at the University of Detroit Mercy. She spearheaded the development of two university department's community outreach and development strategy, CIS (Cyber security programs) and the Criminal Justice (CJ, and Intelligence Analysis). Tamara coordinates projects with government entities, academic organizations, industry and law enforcement agencies locally, nationally and internationally.
Inhaltsangabe
1. Why You Should Read This Book 2. Getting Down to Business: Data Security 3. Software Security: Software Underlies Everything 4. Component Security: It All Starts with Components 5. Connection Security 6. System Security: Assembling the Parts into a Useful Whole 7. Human Security: Human-Centered Threats 8. Organizational Security: Introduction Securing the Enterprise 9. Societal Security: Security and Society
1. Why You Should Read This Book 2. Getting Down to Business: Data Security 3. Software Security: Software Underlies Everything 4. Component Security: It All Starts with Components 5. Connection Security 6. System Security: Assembling the Parts into a Useful Whole 7. Human Security: Human-Centered Threats 8. Organizational Security: Introduction Securing the Enterprise 9. Societal Security: Security and Society
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497