BOOKS - NETWORK TECHNOLOGIES - The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/I...
The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Internal Audit and IT Audit) - Daniel Shoemaker, Anne Kohnke, Ken Sigler 2020 EPUB CRC Press BOOKS NETWORK TECHNOLOGIES
ECO~23 kg CO²

2 TON

Views
15648

Telegram
 
The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Internal Audit and IT Audit)
Author: Daniel Shoemaker, Anne Kohnke, Ken Sigler
Year: 2020
Pages: 614
Format: EPUB
File size: 13.5 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Cybersecurity and Privacy in Cyber Physical Systems
Mastering Cybersecurity: Strategies, Technologies, and Best Practices
PowerShell for Cybersecurity Scripting Defense and Offense
Cybersecurity in Context: Technology, Policy, and Law
Breached!: A Cautionary Tale of Cybersecurity and Intrigue
Effective Cybersecurity A Guide to Using Best Practices and Standards
PowerShell for Cybersecurity Scripting Defense and Offense
Mastering Cybersecurity Strategies, Technologies, and Best Practices
Linux Essentials for Cybersecurity Lab Manual
The Code of Honor Embracing Ethics in Cybersecurity
Artificial Intelligence and Cybersecurity Advances and Innovations
Cybersecurity Tabletop Exercises: From Planning to Execution
Cybersecurity Tabletop Exercises From Planning to Execution
Cybersecurity in Context Technology, Policy, and Law
CCNA Cybersecurity Operations Companion Guide
Cybersecurity Politics, Governance and Conflict in Cyberspace
Maritime Cybersecurity: A Guide for Leaders and Managers
Social Engineering in Cybersecurity: Threats and Defenses
The Code of Honor: Embracing Ethics in Cybersecurity
Social Engineering in Cybersecurity Threats and Defenses
The Cybersecurity Guide to Governance, Risk, and Compliance
Cybersecurity Threats, Malware Trends 2nd ed.
Building an Effective Cybersecurity Program, Second Edition
Social Engineering in Cybersecurity Threats and Defenses
Advanced Techniques and Applications of Cybersecurity and Forensics
TIME Cybersecurity Hacking, the Dark Web and You
Exploring Careers in Cybersecurity and Digital Forensics
What Is Cybersecurity (Let|s Find Out! Computer Science)
Mastering Cybersecurity Strategies, Technologies, and Best Practices
Cybersecurity Tabletop Exercises From Planning to Execution
Cybersecurity in Context Technology, Policy, and Law
Mastering Cybersecurity A Practical Guide for Professionals (Volume 1)
Python Programming for Cybersecurity: A Comprehensive Handbook for Beginners
Python Programming for Cybersecurity A Comprehensive Handbook for Beginners
Effective Cybersecurity A Guide to Using Best Practices and Standards (2019)
Cyberjutsu Cybersecurity for the Modern Ninja (Early Access)
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies (Final)
Hacking the Hacker: My Top 10 Unconventional Cybersecurity Techniques
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners
Engineering Trustworthy Systems Get Cybersecurity Design Right the First Time