£80.95

CRC Press A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0): 3 (Security, Audit and Leadership Series)

Price data last checked 58 day(s) ago - refreshing...

View at Amazon

Price History & Forecast

Last 33 days • 33 data points (No recent data available)

Historical
Generating forecast...
£80.95 £76.90 £78.52 £80.14 £81.76 £83.38 £85.00 25 January 2026 02 February 2026 10 February 2026 18 February 2026 26 February 2026

Price Distribution

Price distribution over 33 days • 1 price levels

Days at Price
33 days 0 8 17 25 33 £81 Days at Price

Price Analysis

Most common price: £81 (33 days, 100.0%)

Price range: £81 - £81

Price levels: 1 different prices over 33 days

Description

Product Description A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice. About the Author Daniel P Shoemaker, PhD, is principal investigator and senior research scientist at the University of Detroit Mercy’s Center for Cyber Security and Intelligence Studies. Dan has served 30 years as a professor at UDM with 25 of those years as department chair. He served as a co-chair for both the Workforce Training and Education and the Software and Supply Chain Assurance Initiatives for the Department of Homeland Security, and was a subject matter expert for the NICE Cybersecurity Workforce Framework 2.0. Dan has coauthored six books in the field of cybersecurity and has authored more than one hundred journal publications. Dan earned his PhD from the University of Michigan. Anne Kohnke, PhD, is an assistant professor of IT at Lawrence Technological University and teaches courses in both the information technology and organization development/change management disciplines at the bachelor through doctorate levels. Anne started as an adjunct professor in 2002 and joined the faculty full time in 2011. Her IT career started in the mid-1980s on a help desk, and over the years, Anne developed technical proficiency as a database administrator, network administrator, systems analyst, and technical project manager. After a decade, Anne was promoted to management and worked as an IT director, vice president of IT and chief information security officer (CISO). Anne earned her PhD from Benedictine University. Ken Sigler is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. His primary research is in the areas of software management, software assurance, and cloud computing. He developed the college’s CIS program option entitled "Information Technologies for Homeland Security." Until 2007, Ken served as the liaison for the college to the International Cybersecurity Education Coalition (ICSEC), of which he is one of three founding members. Ken is a member of IEEE, the Distributed Management Task Force (DMTF), and the Association for Information Systems (AIS).

Product Specifications

Format
Hardcover
Domain
Amazon UK
Release Date
08 February 2016
Listed Since
28 July 2015

Barcode

No barcode data available

Similar Products You Might Like

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Security, Audit and Leadership Series)
96% match

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Security, Audit and Leadership Series)

CRC Press

£46.02 09 Feb 2026
CRC Press - The Cybersecurity Body of Knowledge Textbook
96% match

CRC Press - The Cybersecurity Body of Knowledge Textbook

CRC Press

£40.45 08 Mar 2026
A Practical Introduction to Enterprise Network and Security Management
94% match

A Practical Introduction to Enterprise Network and Security Management

CRC Press

£96.60 09 Mar 2026
Practical Information Security: A Competency-Based Education Course
94% match

Practical Information Security: A Competency-Based Education Course

Springer

£54.12 28 Feb 2026
Innovations in Cybersecurity Education
94% match

Innovations in Cybersecurity Education

Springer

£95.99 09 Mar 2026
Data Science in Cybersecurity and Cyberthreat Intelligence: 177 (Intelligent Systems Reference Library, 177)
94% match

Data Science in Cybersecurity and Cyberthreat Intelligence: 177 (Intelligent Systems Reference Library, 177)

Springer

£126.00 04 Mar 2026
Computer and Network Security Essentials
94% match

Computer and Network Security Essentials

Springer

£88.81 22 Feb 2026
Elsevier Corporate Security Organizational Structure Report
93% match

Elsevier Corporate Security Organizational Structure Report

Elsevier

£119.39 18 Apr 2026
Springer Advances in Cyber Security - Principles and Techniques
93% match

Springer Advances in Cyber Security - Principles and Techniques

Springer

£94.25 15 Apr 2026
Advances in Cybersecurity Management
93% match

Advances in Cybersecurity Management

Springer

£68.04 21 Feb 2026
Internet of Things, Threats, Landscape, and Countermeasures
93% match

Internet of Things, Threats, Landscape, and Countermeasures

CRC Press

£97.00 10 Mar 2026
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice
93% match

A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice

£77.38 12 Dec 2025
The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership (Security, Audit and Leadership Series)
93% match

The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership (Security, Audit and Leadership Series)

CRC Press

£48.99 14 Apr 2026
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard
93% match

Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard

CRC Press

£75.35 08 Mar 2026
Cyber Security and Network Security (Advances in Cyber Security)
93% match

Cyber Security and Network Security (Advances in Cyber Security)

John Wiley & Sons Inc

£106.00 09 Mar 2026
Information Security in Diverse Computing Environments (Advances in Information Security, Privacy, and Ethics)
93% match

Information Security in Diverse Computing Environments (Advances in Information Security, Privacy, and Ethics)

Information Science Reference

£203.21 30 Jan 2026
Cyber Forensics: Examining Emerging and Hybrid Technologies
93% match

Cyber Forensics: Examining Emerging and Hybrid Technologies

CRC Press

£97.39 09 Mar 2026
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity
93% match

Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity

Packt Publishing

£31.31 28 Jan 2026
Cybersecurity Workforce: Staffing Needs, Skills Requirements and Coding Procedures (Business Issues, Competition and Entrepreneurship)
93% match

Cybersecurity Workforce: Staffing Needs, Skills Requirements and Coding Procedures (Business Issues, Competition and Entrepreneurship)

£102.54 25 Feb 2026
The CISO’s Transformation: Security Leadership in a High Threat Landscape
93% match

The CISO’s Transformation: Security Leadership in a High Threat Landscape

Springer

£47.20 15 Feb 2026
CRC Press Emerging Security Algorithms and Techniques Book
93% match

CRC Press Emerging Security Algorithms and Techniques Book

CRC Press

£82.27 18 Apr 2026
Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
93% match

Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science

CRC Press

£73.13 18 Apr 2026
CRC Press - Cybersecurity and Privacy in Cyber Physical Systems
93% match

CRC Press - Cybersecurity and Privacy in Cyber Physical Systems

CRC Press

£94.86 05 Mar 2026
Cybersecurity for Information Professionals: Concepts and Applications
93% match

Cybersecurity for Information Professionals: Concepts and Applications

CRC Press

£66.23 28 Feb 2026