Cyber security culture : counteracting cyber threats through organizational learning and training /
Cyber Security Culture is a research-based book focusing on cyber security and countermeasures against orchestrated cyber attacks. Reinforced with insights from experts who do not normally release data and information into the public arena, the book enables managers within organizations across diffe...
Furkejuvvon:
| Váldodahkki: | |
|---|---|
| Eará dahkkit: | |
| Materiálatiipa: | Girji |
| Giella: | eaŋgalasgiella |
| Almmustuhtton: |
Farnham, Surrey, England : Burlington, VT :
Gower ; Ashgate,
2013.
|
| Ráidu: | Gower applied business research
|
| Fáttát: | |
| Fáddágilkorat: |
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
MARC
| LEADER | 00000cam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 17433856 | ||
| 003 | KE-NaDUL | ||
| 005 | 20180308105244.0 | ||
| 008 | 120817s2013 enka b 001 0 eng | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |6 HD00302 T75 02013 |7 0 |8 GC |9 124499 |a DUA |b DUA |c GC |d 2018-03-08 |e Educate Yourself |f Purchase |g 11205.00 |l 0 |o HD30.2.T75 2013 |p BK0105305 |r 2018-03-08 00:00:00 |w 2018-03-08 |x 105305 |y G | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |6 HD00302 T75 02013 |7 0 |8 GC |9 124500 |a DUA |b DUA |c GC |d 2018-03-08 |e Educate Yourself |f Purchase |g 11205.00 |l 0 |o HD30.2.T75 2013 |p BK0105306 |r 2018-03-08 00:00:00 |w 2018-03-08 |x 105306 |y G | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |6 HD00302 T75 02013 |7 0 |8 GC |9 124501 |a DUA |b DUA |c GC |d 2018-03-08 |e Educate Yourself |f Purchase |g 11205.00 |l 0 |o HD30.2.T75 2013 |p BK0105307 |r 2018-03-08 00:00:00 |w 2018-03-08 |x 105307 |y G | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |6 HD00302 T75 02013 |7 0 |8 GC |9 124502 |a DUN |b DUN |c GC |d 2018-03-08 |e Educate Yourself |f Purchase |g 11205.00 |l 0 |o HD30.2.T75 2013 |p BK0105308 |r 2018-03-08 00:00:00 |w 2018-03-08 |x 105308 |y G | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |6 HD00302 T75 02013 |7 0 |8 GC |9 124503 |a DUN |b DUN |c GC |d 2018-03-08 |e Educate Yourself |f Purchase |g 11205.00 |l 0 |o HD30.2.T75 2013 |p BK0105309 |r 2018-03-08 00:00:00 |w 2018-03-08 |x 105309 |y G | ||
| 999 | |c 189284 |d 189284 | ||
| 010 | |a 2012033279 | ||
| 020 | |a 9781409456940 (hbk. : alk. paper) | ||
| 020 | |a 1409456943 (hbk. : alk. paper) | ||
| 020 | |a 9781409456957 (ebk. PDF) | ||
| 020 | |a 9781409474579 (ebk. ePUB) | ||
| 040 | |a DLC |c DUL |d DUL | ||
| 042 | |a pcc | ||
| 082 | 0 | 0 | |a 658.4/78 |2 23 |
| 100 | 1 | |a Trim, Peter R. J. |9 935 | |
| 245 | 1 | 0 | |a Cyber security culture : |b counteracting cyber threats through organizational learning and training / |c Peter Trim and David Upton. |
| 260 | |a Farnham, Surrey, England : |b Gower ; |a Burlington, VT : |b Ashgate, |c 2013. | ||
| 300 | |a xvii, 211 p. : |b ill. ; |c 25 cm. | ||
| 490 | 0 | |a Gower applied business research | |
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a Cyber Security Culture is a research-based book focusing on cyber security and countermeasures against orchestrated cyber attacks. Reinforced with insights from experts who do not normally release data and information into the public arena, the book enables managers within organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that will ultimately protect an organization from attacks. Peter trim and David Upton believe that the speed and complexity of cyber attacks demand a different approach to security management, including scenario-based planning and training, to supplement security polices and technical protection systems. The authors provide in-depth cover of issues such as how organizational learning can be used to produce cultural change that addresses the behavior of individuals as well as machines. The book provides information that will help managers to form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate practical interventions such as table top exercises. --from barnesandnoble.com | ||
| 650 | 0 | |a Corporations |x Security measures. |9 936 | |
| 650 | 0 | |a Computer security. |9 342 | |
| 650 | 0 | |a Computer networks |x Security measures. |9 341 | |
| 650 | 0 | |a Computer crimes |x Prevention. |9 937 | |
| 700 | 1 | |a Upton, David, |d 1949- |9 938 | |
| 906 | |a 7 |b cbc |c orignew |d 1 |e ecip |f 20 |g y-gencatlg | ||
| 942 | |2 lcc |c G |h HD30.2. |i .T75 |m 2013 | ||
| 955 | |b xj15 2012-08-17 |i xj15 2012-08-17 (telework) |a xj15 2012-08-17 to Dewey |a xn05 2013-07-24 1 copy rec'd., to CIP ver. |a rl00 2013-07-29 to SMA | ||