Teaching Cybersecurity
Teaching Cybersecurity
A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
Sigler, Ken; Shoemaker, Daniel; Shoemaker, Tamara
Taylor & Francis Ltd
02/2023
228
Dura
Inglês
9781032034089
15 a 20 dias
580
Descrição não disponível.
1. Why You Should Read This Book, 2. Getting Down to Business: Data Security, 3. Software Security: Software Underlies Everything, 4. Component Security: It All Starts with Components, 5. Connection Security, 6. System Security: Assembling the Parts into a Useful Whole, 7. Human Security: Human-Centered Threats, 8. Organizational Security: Introduction Securing the Enterprise, 9. Societal Security: Security and Society
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cybersecurity;data security;handbook for teaching cybersecurity;K-12 educators;societal security;system security;software security;Google Play;Jelly Donut;Digital Forensics;Human Security Area;Intrusion Detection Systems;Young Man;Reverse Engineering;Atm Machine;Title III;Corporate Ceo;Top Secret;System Administration Function;Social Engineering Attacks;Scale Learning Experiences;Security Program Management;Component Security;Phone's Operation;Connection Security;RJ45 Connector;Software Affect;System Thinking;Common Weakness Enumeration;Software Development Process
1. Why You Should Read This Book, 2. Getting Down to Business: Data Security, 3. Software Security: Software Underlies Everything, 4. Component Security: It All Starts with Components, 5. Connection Security, 6. System Security: Assembling the Parts into a Useful Whole, 7. Human Security: Human-Centered Threats, 8. Organizational Security: Introduction Securing the Enterprise, 9. Societal Security: Security and Society
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cybersecurity;data security;handbook for teaching cybersecurity;K-12 educators;societal security;system security;software security;Google Play;Jelly Donut;Digital Forensics;Human Security Area;Intrusion Detection Systems;Young Man;Reverse Engineering;Atm Machine;Title III;Corporate Ceo;Top Secret;System Administration Function;Social Engineering Attacks;Scale Learning Experiences;Security Program Management;Component Security;Phone's Operation;Connection Security;RJ45 Connector;Software Affect;System Thinking;Common Weakness Enumeration;Software Development Process