000 -LEADER |
fixed length control field |
03878cam a22003858i 4500 |
001 - CONTROL NUMBER |
control field |
22755961 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250412091357.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220818s2023 flu b 000 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781032034096 [paperback] |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
University of Cebu-Banilad |
Transcribing agency |
University of Cebu-Banilad |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Shoemaker, Dan, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Teaching cybersecurity : |
Remainder of title |
a handbook for teaching the cybersecurity body of knowledge in a conventional classroom / |
Statement of responsibility, etc |
Daniel Shoemaker, Ken Sigler, and Tamara Shoemaker. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton : |
Name of publisher, distributor, etc |
CRC Press, |
Date of publication, distribution, etc |
c2023. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvi, 202 pages : |
Other physical details |
color illustrations ; |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type |
volume |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Security, Audit and Leadership Series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Contents: Chapter 1 Why you should read this book -- Chapter 2 Getting down to business: data security -- Chapter 3 Software security: software underlies everything -- Chapter 4 Component security: it all starts with components -- Chapter 5 Connection security -- Chapter 6 System security: assembling the parts into a useful whole -- Chapter 7 Human security: human-centered threats -- Chapter 8 Organizational security: introduction -- Chapter 9 Societal security: security and society. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical jargon and industry stovepipes and give you, the classroom teacher, a unified understanding of what must be taught. That advice is based on a single authoritative definition of the field. In 2017, the three societies that write the standards for computing, software engineering, and information systems came together to define a single model of the field of cybersecurity. It is based on eight building blocks. That definition is presented here. However, we also understand that secondary school teachers are not experts in arcane subjects like software, component, human, or societal security. Therefore, this book explains cybersecurity through a simple story rather than diving into execution details. Tom, a high school teacher, and Lucy, a middle school teacher, are tasked by their district to develop a cybersecurity course for students in their respective schools. They are aided in this by "The Doc," an odd fellow but an expert in the field. Together they work their way through the content of each topic area, helping each other to understand what the student at each level in the educational process has to learn. The explanations are simple, easy to understand, and geared toward the teaching aspect rather than the actual performance of cybersecurity work. Each chapter is a self-contained explanation of the cybersecurity content in that area geared to teaching both middle and high school audiences. The eight component areas are standalone in that they can be taught separately. But the real value lies in the comprehensive but easy-to-understand picture that the reader will get of a complicated field."--Provided by the publisher |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
Adult |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Deans/Chairperson |
Brigoli, Darlyne |
Department |
College of Computer Engineering |
Subject Category |
Computer Engineering |
546 ## - LANGUAGE NOTE |
Language note |
Text in English |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measires |
-- |
Study and teaching. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet |
General subdivision |
Security measures |
-- |
Study and teaching. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Sigler, Kenneth, |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Shoemaker, Tamara, |
Titles and other words associated with a name |
(Cyber security expert), |
Relator term |
author. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Type of record |
Book |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Encoded by |
adryann[new] |
Date encoded |
04/10/2025 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Encoded by |
Janna [edited] |
Date encoded |
04/12/2025 |