Assignment Instructions for: Information Security Analyst Week 5 Assignment: Create a document in Word that is formatted as an annotated bibliography

technical writing

Description

Assignment Instructions for: Information Security Analyst Week 5 Assignment: Create a document in Word that is formatted as an annotated bibliography. On the document, list four (4), varied sources you will use in your final career interest project. Be sure to provide the essential information for each source including author name(s), title of the source, and other details. Under the citation of each source, write an original paragraph of 3-5 sentences telling what is contained in the source (summarize when appropriate) and why the source could be relevant to your project. Information about creating an annotated bibliography and what one looks like: http://library.sjsu.edu/video/annotated-bibliographies Remember: You select the citation method you want to use based on your academic degree program. Return to Lesson 4 if you need to see the list of disciplines and their corresponding citation styles. Upload your annotated bibliography by Sunday of Week 5. The annotated bibliography can easily be built from the source search worksheet used in week 3 of this course and additional sources you have selected. Grading Rubric. N: Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2016-17 Edition, Information Security Analysts, on the Internet at http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (visited April 08, 2016). http://www.careerigniter.com/questions/what-does-an-information-security-analyst-do/ Information security buzz. (2015). “IT Careers: How to Become an Information Security Analyst”retrieved from http://www.informationsecuritybuzz.com/articles/it-careers-how-to-become-an-information-security-analyst/ study. (n.d.). “How to Become an Information Systems Security Engineer”.retrieved from http://study.com/articles/How_to_Become_an_Information_Systems_Security_Engineer.html http://www.myfuture.com/careers/overview/information-security-analysts_15-1122.00

Instruction Files

Related Questions in technical writing category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.