0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (7)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback):... Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback)
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
R1,076 Discovery Miles 10 760 Ships in 9 - 15 working days

Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind

Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework... Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework (Paperback)
Anne Kohnke, Ken Sigler, Dan Shoemaker
R1,319 Discovery Miles 13 190 Ships in 9 - 15 working days

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Hardcover):... Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Hardcover)
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
R2,963 Discovery Miles 29 630 Ships in 12 - 17 working days

Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R1,433 Discovery Miles 14 330 Ships in 12 - 17 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Paperback)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R1,250 R1,133 Discovery Miles 11 330 Save R117 (9%) Ships in 5 - 10 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover): Ken... Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover)
Ken Sigler, Dan Shoemaker, Anne Kohnke
R4,268 Discovery Miles 42 680 Ships in 12 - 17 working days

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Hardcover)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R3,440 Discovery Miles 34 400 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Paperback): Ken... Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Paperback)
Ken Sigler, Dan Shoemaker, Anne Kohnke
R1,905 Discovery Miles 19 050 Ships in 12 - 17 working days

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework... Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework (Hardcover)
Anne Kohnke, Ken Sigler, Dan Shoemaker
R3,288 R2,741 Discovery Miles 27 410 Save R547 (17%) Ships in 9 - 15 working days

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

How to Build a Cyber-Resilient Organization (Paperback): Dan Shoemaker, Anne Kohnke, Ken Sigler How to Build a Cyber-Resilient Organization (Paperback)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,109 Discovery Miles 21 090 Ships in 12 - 17 working days

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves around the steps to perform strategic cyber-resilience planning, implementation and evolution. Readers will know how to perform the necessary activities to identify, prioritize and deploy targeted controls and maintain a persistent and reliable reporting system.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,436 Discovery Miles 24 360 Ships in 12 - 17 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Adsorption at Natural Minerals/Water…
Shaoxian Song, Bowen Li Hardcover R4,508 Discovery Miles 45 080
Guide To Sieges Of South Africa…
Nicki Von Der Heyde Paperback  (4)
R250 R195 Discovery Miles 1 950
Conceptions of the Watery World in…
Georgia L Irby Hardcover R3,225 Discovery Miles 32 250
Desalination and Water Treatment
Murat Eyvaz, Ebubekir Yuksel Hardcover R4,070 R3,798 Discovery Miles 37 980
Analogy in Indian and Western…
David B. Zilberman Hardcover R4,259 Discovery Miles 42 590
Arsenic and Fluoride Contamination - A…
Abida Farooqi Hardcover R3,190 R1,910 Discovery Miles 19 100
From the Act of Judging to the Sentence…
Artur Rojszczak Hardcover R2,935 Discovery Miles 29 350
Little Bird Of Auschwitz - How My Mother…
Alina Peretti, Jacques Peretti Paperback R453 R370 Discovery Miles 3 700
The Lie Of 1652 - A Decolonised History…
Patric Mellet Paperback  (7)
R365 R314 Discovery Miles 3 140
WTF - Capturing Zuma: A Cartoonist's…
Zapiro Zapiro, Mike Willis Paperback R295 R231 Discovery Miles 2 310

 

Partners