دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Daniel Shoemaker (Author), Anne Kohnke (Author), Ken Sigler (Author) سری: ISBN (شابک) : 9781003022596, 9781000050394 ناشر: CRC Press سال نشر: 2020 تعداد صفحات: 615 زبان: فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 12 مگابایت
در صورت تبدیل فایل کتاب The Cybersecurity Body of Knowledge-The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه دانش امنیت سایبری-توصیه های ACM/IEEE/AIS/IFIP برای یک برنامه درسی کامل در امنیت سایبری نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
مجموعه دانش امنیت سایبری، محتوا، هدف و استفاده از هشت حوزه دانشی را توضیح میدهد که مرزهای رشته امنیت سایبری را مشخص میکند. این بحث بر مفاهیم اساسی هر حوزه دانش متمرکز است و توسط آن هدایت می شود که به طور جمعی مجموعه دانش امنیت سایبری را برای ارائه تصویری کامل از این حوزه به تصویر می کشد. این کتاب بر اساس یک ابتکار جهانی کاملاً جدید و منحصر به فرد، معروف به CSEC2017 است که توسط ACM، IEEE-CS، AIS SIGSEC و IFIP WG 11.8 ایجاد و تأیید شده است. این امر برای هر مربی در رشته امنیت سایبری ارتباط عملی دارد. از آنجا که مشخصات این مجموعه از دانش را نمی توان در یک متن بیان کرد، نویسندگان مروری جامع لازم را ارائه می دهند. در اصل، این بررسی سطح مقدماتی حوزه جامع امنیت سایبری است. این به عنوان نقشه راهی برای افراد خواهد بود تا بعداً در یک منطقه خاص مورد علاقه تحقیق کنند. این ارائه همچنین به صراحت برای کمک به اعضای هیئت علمی، مدیران، CISO ها، سیاست گذاران و سهامداران درگیر با طرح های توسعه نیروی کار امنیت سایبری طراحی شده است. این کتاب به سمت کاربرد عملی یک پایه محاسباتی، مفاهیم مقطعی، و دانش و مهارتهای ضروری رشته امنیت سایبری برای برآورده کردن نیازهای نیروی کار است. دان شومیکر، دکترا، استاد تمام، دانشمند تحقیقاتی ارشد و مدیر برنامه در مرکز مطالعات امنیت سایبری و اطلاعاتی دانشگاه دیترویت مرسی است. دان رئیس سابق دپارتمان امنیت سایبری و سیستمهای اطلاعاتی است و کتابها و مقالات مجلات متعددی با تمرکز بر امنیت سایبری تألیف کرده است. آن کوهنکه، دکترا، دانشیار امنیت سایبری و محقق اصلی مرکز تعالی دانشگاهی در دفاع سایبری در دانشگاه دیترویت مرسی است. تحقیقات Anne بر امنیت سایبری، مدیریت ریسک، مدلسازی تهدید و کاهش بردارهای حمله متمرکز است. کن سیگلر، MS، یکی از اعضای هیئت علمی برنامه سیستم های اطلاعات کامپیوتری (CIS) در پردیس Auburn Hills در کالج اجتماعی اوکلند در میشیگان است. تحقیقات کن در زمینه های مدیریت نرم افزار، تضمین نرم افزار و امنیت سایبری است.
The Cybersecurity Body of Knowledgeexplains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy\'s Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne\'s research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken\'s research is in the areas of software management, software assurance, and cybersecurity.
Foreword 1
Foreword 2
Author Biographies
Introduction
Chapter 1 Securing Cyberspace Is Everybody’s Business
Introduction: The Current Situation Is Out of Control
The Challenge: How Do You Protect Something that Doesn’t Actually Exist?
We Must Re-evaluate Our Assumptions
The Adversary Changes Thing
The Three-Legged Stool
Learning to Play Better with Others
Creating a Holistic Solution
The Importance of Knowing What to Do
Enabling Common Understanding
Education Is the Key
The Body of Knowledge and Educational Strategy
Cybersecurity as an Academic Study
The Importance of Unified Recommendations about Areas of Vital Interest
Circumscribing the Field: Background and Intention of CC2005
Defining the Elements of the Discipline of Cybersecurity: CSEC2017
Knowledge Area One: Data Security
Knowledge Area Two: Software Security
Knowledge Area Three: Component Security
Knowledge Area Four: Connection Security
Knowledge Area Five: System Security
Knowledge Area Six: Human Security
Knowledge Area Seven: Organizational Security
Knowledge Area Eight: Societal Security
Real-World Utilization of the CSEC2017 Body of Knowledge
CSEC2017 Framework Areas of Application
Thirty Review Questions: Introduction to the CSEC Standard
You Might Also Like to Read
Chapter Summary
Keywords
References
Chapter 2 The Cybersecurity Body of Knowledge 39
Bodies of Knowledge Are Essential Tools in Educational Settings
Bodies of Knowledge
Making Cybersecurity Teaching Real
Validating Curricular Concepts
Applying the CSEC2017
The CSEC2017 Model
The CSEC2017 Organization
The CSEC2017 Implementation Process
Knowledge Area One: Data Security
Knowledge Area Two: Software Security
Knowledge Area Three: Component Security
Knowledge Area Four: Connection Security
Knowledge Area Five: System Security
Knowledge Area Six: Human Security
Knowledge Area Seven: Organizational Security
Knowledge Area Eight: Societal Security
Twenty Review Questions: The Cybersecurity Body of Knowledge
You Might Also Like to Read
Chapter Summary
Keywords
Chapter 3 Data Security
Surviving in a Digital Era
The CSEC2017 Data Security Knowledge Units
Knowledge Unit One: Cryptography
Knowledge Unit Two: Digital Forensics
Knowledge Unit Three: Data Integrity and Authentication
Knowledge Unit Four: Access Control
Knowledge Unit Five: Secure Communication Protocols
Knowledge Unit Six: Cryptanalysis
Knowledge Unit Seven: Data Privacy
Knowledge Unit Eight: Information Storage Security
Chapter Review Questions
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Data Security Knowledge Area
Keywords
References
Chapter 4 Software Security
Building Pathways toward Software Security
The CSEC2017 Software Security Knowledge Units
Knowledge Unit One: Fundamental Principles
Knowledge Unit Two: Design
Knowledge Unit Three: Implementation
Knowledge Unit Four: Analysis and Testing
Knowledge Unit Five: Deployment and Maintenance
Knowledge Unit Six: Documentation
Knowledge Unit Seven: Ethics
Twenty Review Questions for This Chapter
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Component Security
Knowledge Area
Keywords
Reference
Chapter 5 Component Security
It All Starts with the Components
The CSEC2017 Component Security Knowledge Units
Knowledge Unit One: Component Design
Knowledge Unit Two: Component Procurement
Knowledge Unit Three: Component Testing
Knowledge Unit Four: Component Reverse Engineering
Forty Review Questions: Component Security
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Component Security
Knowledge Area
Keywords
Reference
Chapter 6 Connection Security
Introduction: The Challenge of Connecting the Enterprise
The CSEC Connection Security Knowledge Areas
Knowledge Unit One: Physical Media
Knowledge Unit Two: Physical Interfaces and Connectors
Knowledge Unit Three: Hardware Architecture
Knowledge Unit Four: Distributed Systems Architecture
Knowledge Unit Five: Network Architecture
Knowledge Unit Six: Network Implementations
Knowledge Unit Seven: Network Services
Knowledge Unit Eight: Network Defense
Twenty Review Questions: Connection Security
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Connection Security
Knowledge Area
Keywords
References
Chapter 7 System Security
Assembling the Parts into a Useful Whole
The Key Role of Design in Systems
The CSEC2017 System Security Knowledge Units
Knowledge Unit One: System Thinking
Knowledge Unit Two: System Management
Knowledge Unit Three: System Access
Knowledge Unit Four: System Control
Knowledge Unit Five: System Retirement
Knowledge Unit Six: System Testing
Knowledge Unit Seven: Common System Architectures
Seventy Review Questions: System Security 380
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Component Security
Knowledge Area
Keywords
References
Chapter 8 Human Security
Human-Centered Threats
Ensuring Disciplined Practice
The Challenging Case of Human Behavior
The CSEC2017 Human Security Knowledge Units
Knowledge Unit One: Identity Management
Knowledge Unit Two: Social Engineering
Knowledge Unit Three: Personal Compliance
Knowledge Unit Four: Awareness and Understanding
Knowledge Unit Five: Social and Behavioral Privacy
Knowledge Unit Six: Personal Data Privacy and Security
Knowledge Unit Seven: Usable Security and Privacy
Seventy Review Questions: Human Security
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Human Security
Knowledge Area
Keywords
References
Chapter 9 Organizational Security
Introduction Securing the Entire Enterprise
Integrating the Elements of Cybersecurity into an Applied Solution
The CSEC2017 Organizational Security Knowledge Units
Knowledge Area One: Risk Management
Knowledge Area Two: Security Governance and Policy
Knowledge Area Three: Analytical Tools
Knowledge Unit Four: Systems Administration
Knowledge Area Five: Cybersecurity Planning
Knowledge Unit Six: Business Continuity, Disaster
Knowledge Unit Seven: Security Program Management
Knowledge Unit Eight: Personnel Security
Knowledge Unit Nine: Security Operations
Forty Review Questions: Organizational Security
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Organizational Security
Knowledge Area
Keywords
References
Chapter 10 Societal Security
Security and Worldwide Connectivity
The CSEC2017 and the Profession
The CSEC2017 Societal Security Knowledge Units
Knowledge Unit One: Cybercrime
Knowledge Unit Two: Cyber Law
Knowledge Unit Three: Cyber Ethics
Knowledge Unit Four: Cyber Policy
Knowledge Unit Five: Privacy
You Might Also Like to Read
Chapter Summary
Learning Objectives for the Human Security Knowledge Area
Keywords
References
Index