Teaching cybersecurity : (Record no. 13480)

000 -LEADER
fixed length control field 03878cam a22003858i 4500
001 - CONTROL NUMBER
control field 22755961
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250412091357.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220818s2023 flu b 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032034096 [paperback]
040 ## - CATALOGING SOURCE
Original cataloging agency University of Cebu-Banilad
Transcribing agency University of Cebu-Banilad
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Shoemaker, Dan,
Relator term author.
245 10 - TITLE STATEMENT
Title Teaching cybersecurity :
Remainder of title a handbook for teaching the cybersecurity body of knowledge in a conventional classroom /
Statement of responsibility, etc Daniel Shoemaker, Ken Sigler, and Tamara Shoemaker.
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc c2023.
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 202 pages :
Other physical details color illustrations ;
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type volume
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Security, Audit and Leadership Series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Contents: Chapter 1 Why you should read this book -- Chapter 2 Getting down to business: data security -- Chapter 3 Software security: software underlies everything -- Chapter 4 Component security: it all starts with components -- Chapter 5 Connection security -- Chapter 6 System security: assembling the parts into a useful whole -- Chapter 7 Human security: human-centered threats -- Chapter 8 Organizational security: introduction -- Chapter 9 Societal security: security and society.
520 ## - SUMMARY, ETC.
Summary, etc "Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical jargon and industry stovepipes and give you, the classroom teacher, a unified understanding of what must be taught. That advice is based on a single authoritative definition of the field. In 2017, the three societies that write the standards for computing, software engineering, and information systems came together to define a single model of the field of cybersecurity. It is based on eight building blocks. That definition is presented here. However, we also understand that secondary school teachers are not experts in arcane subjects like software, component, human, or societal security. Therefore, this book explains cybersecurity through a simple story rather than diving into execution details. Tom, a high school teacher, and Lucy, a middle school teacher, are tasked by their district to develop a cybersecurity course for students in their respective schools. They are aided in this by "The Doc," an odd fellow but an expert in the field. Together they work their way through the content of each topic area, helping each other to understand what the student at each level in the educational process has to learn. The explanations are simple, easy to understand, and geared toward the teaching aspect rather than the actual performance of cybersecurity work. Each chapter is a self-contained explanation of the cybersecurity content in that area geared to teaching both middle and high school audiences. The eight component areas are standalone in that they can be taught separately. But the real value lies in the comprehensive but easy-to-understand picture that the reader will get of a complicated field."--Provided by the publisher
521 ## - TARGET AUDIENCE NOTE
Target audience note Adult
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Deans/Chairperson Brigoli, Darlyne
Department College of Computer Engineering
Subject Category Computer Engineering
546 ## - LANGUAGE NOTE
Language note Text in English
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measires
-- Study and teaching.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures
-- Study and teaching.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sigler, Kenneth,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shoemaker, Tamara,
Titles and other words associated with a name (Cyber security expert),
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Type of record Book
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Encoded by adryann[new]
Date encoded 04/10/2025
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Encoded by Janna [edited]
Date encoded 04/12/2025
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Library Location Other Library Location Shelving location Date acquired Source of Acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
          College Annex Library UCBL_EXT Subject Reference 23/01/2025 CD Books 4320.00   005.8071 Sh73 2023 3UCBL000028671 10/04/2025 10/04/2025 Subject Reference

University of Cebu - Banilad | 6000, Gov. M. Cuenco Ave, Cebu City, 6000 Cebu, Philippines
Tel. 410 8822 local 7123| e-mail ucbaniladcampus.library@gmail.com

Powered by Koha