Security : the Human Factor.
This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely :
IT Governance Pub.,
2010.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn700706573 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 110205s2010 xx ob 000 0 eng d | ||
040 | |a MERUC |b eng |e pn |c MERUC |d EBLCP |d STF |d OCLCQ |d N$T |d B24X7 |d E7B |d OCLCQ |d UMI |d DEBSZ |d JSTOR |d OCLCF |d OCLCO |d OCLCQ |d YDXCP |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d Z5A |d LIV |d MERUC |d OCLCQ |d IOG |d VNS |d VTS |d CEF |d OCLCQ |d LVT |d UAB |d M8D |d UKAHL |d OCLCQ |d MM9 |d UX1 |d TUHNV |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU | ||
019 | |a 794491659 |a 857306731 |a 904210467 |a 1175629223 |a 1243609630 | ||
020 | |a 9781849280648 |q (electronic bk.) | ||
020 | |a 1849280649 |q (electronic bk.) | ||
020 | |z 1849280630 | ||
020 | |z 9781849280631 | ||
029 | 1 | |a AU@ |b 000049149595 | |
029 | 1 | |a AU@ |b 000051448137 | |
029 | 1 | |a AU@ |b 000052006908 | |
029 | 1 | |a AU@ |b 000060584911 | |
029 | 1 | |a AU@ |b 000065313112 | |
029 | 1 | |a DEBBG |b BV041431770 | |
029 | 1 | |a DEBBG |b BV042969632 | |
029 | 1 | |a DEBSZ |b 396943624 | |
029 | 1 | |a DEBSZ |b 39827634X | |
029 | 1 | |a DEBSZ |b 421529016 | |
029 | 1 | |a AU@ |b 000067092817 | |
035 | |a (OCoLC)700706573 |z (OCoLC)794491659 |z (OCoLC)857306731 |z (OCoLC)904210467 |z (OCoLC)1175629223 |z (OCoLC)1243609630 | ||
037 | |a CL0500000268 |b Safari Books Online | ||
037 | |a 22573/ctt4k5gfc |b JSTOR | ||
050 | 4 | |a HD30.2 |b .K43 2010eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8019 |
049 | |a UAMI | ||
100 | 1 | |a Kearney, Paul. | |
245 | 1 | 0 | |a Security : |b the Human Factor. |
260 | |a Ely : |b IT Governance Pub., |c 2010. | ||
300 | |a 1 online resource (60 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources. | |
520 | |a This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references. | ||
590 | |a JSTOR |b Books at JSTOR Demand Driven Acquisitions (DDA) | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Information technology |x Management. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Technologie de l'information |x Gestion. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Information technology |x Management |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
758 | |i has work: |a Security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGH6gYyrgXY8pvddK8Pwyd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Kearney, Paul. |t Security : The Human Factor. |d Ely : IT Governance Publishing, ©2010 |z 9781849280631 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781849281843/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=647939 |z Texto completo |
938 | |a De Gruyter |b DEGR |n 9781849280648 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26134990 | ||
938 | |a Books 24x7 |b B247 |n bks00041214 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL647939 | ||
938 | |a ebrary |b EBRY |n ebr10554860 | ||
938 | |a EBSCOhost |b EBSC |n 391155 | ||
938 | |a YBP Library Services |b YANK |n 3615238 | ||
994 | |a 92 |b IZTAP |