000 | 03890nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-030-50244-7 | ||
003 | DE-He213 | ||
005 | 20210301025450.0 | ||
007 | cr nn 008mamaa | ||
008 | 201121s2020 gw | s |||| 0|eng d | ||
020 | _a9783030502447 | ||
024 | 7 |
_a10.1007/978-3-030-50244-7 _2doi |
|
040 | _cМУБИС | ||
050 | 4 | _aLC1395 | |
050 | 4 | _aLC1081-1087.4 | |
072 | 7 |
_aJNM _2bicssc |
|
072 | 7 |
_aEDU015000 _2bisacsh |
|
072 | 7 |
_aJNM _2thema |
|
072 | 7 |
_aTB _2thema |
|
082 | 0 | 4 |
_a607.11 _223 |
245 | 1 | 0 |
_aInnovations in Cybersecurity Education _h[electronic resource] / _cedited by Kevin Daimi, Guillermo Francia III. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXII, 391 p. 146 illus., 101 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Cyber Security -- Biometric Security -- Security Countermeasures -- Hardware Security -- Risk Management -- Software Security -- Security Education -- Cybersecurity Curriculum -- Cybersecurity Laboratory Exercises -- Cybersecurity Scenarios -- Conclusion. | |
520 | _aThis book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists. Discusses various techniques, methods, and approaches adopted by cybersecurity experts in the field; Provides detailed explanation of the cybersecurity concepts that are aptly reinforced by practical examples; Includes a road map of future trends that are suitable for innovative security education and training. | ||
650 | 0 | _aTechnical education. | |
650 | 0 | _aElectrical engineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aSystem safety. | |
650 | 1 | 4 |
_aEngineering/Technology Education. _0https://scigraph.springernature.com/ontologies/product-market-codes/O43000 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/T24035 |
650 | 2 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aSecurity Science and Technology. _0https://scigraph.springernature.com/ontologies/product-market-codes/P31080 |
700 | 1 |
_aDaimi, Kevin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aFrancia III, Guillermo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030502430 |
776 | 0 | 8 |
_iPrinted edition: _z9783030502454 |
776 | 0 | 8 |
_iPrinted edition: _z9783030502461 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-50244-7 |
942 |
_2ddc _cEBOOK |
||
999 |
_c102462 _d102462 |