NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Teaching cybersecurity : (Record no. 5000)

MARC details
000 -LEADER
fixed length control field 04140cam a22005658i 4500
001 - CONTROL NUMBER
control field 9781003187172
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122826.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220818s2023 flu ob 000 0 eng
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003187172
Qualifying information (ebk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 100318717X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000833409
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000833402
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000833423
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000833429
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032034089
Qualifying information (hbk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032034096
Qualifying information (pbk)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781003187172
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1348335011
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1348335011
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code EDU
Subject category code subdivision 029030
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UB
Source bicssc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8071
Edition number 23/eng/20221018
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Shoemaker, Dan,
Relator term author.
245 10 - TITLE STATEMENT
Title Teaching cybersecurity :
Remainder of title a handbook for teaching the cybersecurity body of knowledge in a conventional classroom /
Statement of responsibility, etc. Daniel Shoemaker, Ken Sigler, and Tamara Shoemaker.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, FL :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Security, Audit and Leadership Series
520 ## - SUMMARY, ETC.
Summary, etc. "Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical jargon and industry stovepipes and give you, the classroom teacher, a unified understanding of what must be taught. That advice is based on a single authoritative definition of the field. In 2017, the three societies that write the standards for computing, software engineering, and information systems came together to define a single model of the field of cybersecurity. It is based on eight building blocks. That definition is presented here. However, we also understand that secondary school teachers are not experts in arcane subjects like software, component, human, or societal security. Therefore, this book explains cybersecurity through a simple story rather than diving into execution details. Tom, a high school teacher, and Lucy, a middle school teacher, are tasked by their district to develop a cybersecurity course for students in their respective schools. They are aided in this by "The Doc," an odd fellow but an expert in the field. Together they work their way through the content of each topic area, helping each other to understand what the student at each level in the educational process has to learn. The explanations are simple, easy to understand, and geared toward the teaching aspect rather than the actual performance of cybersecurity work. Each chapter is a self-contained explanation of the cybersecurity content in that area geared to teaching both middle and high school audiences. The eight component areas are standalone in that they can be taught separately. But the real value lies in the comprehensive but easy-to-understand picture that the reader will get of a complicated field"--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measires
-- Study and teaching.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures
-- Study and teaching.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element EDUCATION / Teaching Methods & Materials / Science & Technology
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Cryptography
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sigler, Kenneth,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shoemaker, Tamara,
Titles and other words associated with a name (Cyber security expert),
Relator term author.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003187172">https://www.taylorfrancis.com/books/9781003187172</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.