Autres vendeurs sur Amazon
Livraison à partir de 0,01 € en France métropolitaine.
Téléchargez l'application Kindle gratuite et commencez à lire des livres Kindle instantanément sur votre smartphone, tablette ou ordinateur - aucun appareil Kindle n'est requis. En savoir plus
Lisez instantanément sur votre navigateur avec Kindle Cloud Reader.
Utilisation de l'appareil photo de votre téléphone portable - scannez le code ci-dessous et téléchargez l'application Kindle.
Saisissez votre téléphone portable ou votre adresse e-mail
En cliquant sur « Envoyer le lien », vous acceptez les Conditions d'utilisation d'Amazon.
Vous acceptez de recevoir un SMS automatique d'Amazon ou en son nom à propos de l'application Kindle sur votre numéro de téléphone portable ci-dessus. Le consentement n'est pas une condition d'achat. Des frais de messages et de données peuvent s'appliquer.
Cybersecurity: The Essential Body of Knowledge Broché – 17 mai 2011
Produits fréquemment achetés ensemble
Description du produit
Biographie de l'auteur
Wm. Arthur Conklin is an Assistant Professor and Director of the Center for Information Security Research and Education in the College of Technology at the University of Houston. He received his Ph.D. in Business Administration, from The University of Texas at San Antonio (UTSA). He holds Security+, CISSP, CSSLP, IAM and IEM certifications. His research interests include the use of systems theory to explore information security, specifically in Cyber Physical Systems. He has an extensive background in secure coding and is a co-chair of the DHS Software Assurance Forum working group for workforce education, training and development.
Détails sur le produit
- Éditeur : Delmar Cengage Learning; New édition (17 mai 2011)
- Langue : Anglais
- Broché : 528 pages
- ISBN-10 : 1435481690
- ISBN-13 : 978-1435481695
- Poids de l'article : 770 g
- Dimensions : 17.78 x 1.91 x 22.23 cm
- Commentaires client :
À propos de l'auteur
Meilleurs commentaires provenant d’autres pays
In all my time reading academic textbooks, this is by far the worst. Written with assumed faith in the "EBK" like the author was peddling some kind of snake oil instead of providing evidence based facts. Looking up the EBK itself shows a pdf created in 2008. Yes. 2008. I've wasted hours on this and I don't think I can go on with all the red flags getting raised. Imagine applying skepticism as an student!
TLDR: the title is misleading and targets the wrong crowd. If the information presented in this text was or is relevant (which I highly doubt), it would only then be useful for executives focused on business management.
This book needs to be RE-WRITTEN, in a way where it is readable. Putting words together makes a sentence but a sentence has no value without context. The authors just put sentences where the prior sentence does not connect with the next. Each sentence is like its own independent thought.
In one sentence for example it is talking about the roles of cyber security and the following sentence is about the process of assurance and the sentence after is about complaints about cyber security process. In no way can a mind connect all of these cause they are not connected in a seamless way.
I imagine students will read it cause the professor enforced it, just like a doctor pushing/promoting a particular medication. I would request that the editor/publisher/authors take the time to re-write this book.
Authors are welcome to contact me
The initial set of chapters (1 thru 6) which talked about the framework itself and the associated roles are reasonably easy to understand. Also, in the initial chapters, almost all the important concepts were always highlighted in bold, which made is much easier to refer back while reading. But in later chapters, most of the new terms were not highlighted, and the paragraphs started jumping into other un-related topics, as if the authors were constantly going into fluff or non-sequiturs.
Another problem is trying to figure out where to find the actual "new" info in each chapter (and not just the one sentence in the chapter summary at the end). The book's text uses lots of appositions in their sentences. But they don't follow the logic of appositions that is expected in English grammar. I could not figure out what concept many sentences were referring back to, since they did not explicitly state anything. Not sure if this is a result of the bad copy editing or that's the way the author's write.
Lastly, the book really started to contradict itself as it went on to the later chapters. For example, what was described on pages 141-142 contradicted the role that was identified on 374-375.