The psychology of information security : resolving conflicts between security compliance and human behaviour /
Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely, Cambridgeshire :
IT Governance Publishing,
2016.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn937390335 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 160208s2016 enka ob 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d JSTOR |d OCLCO |d EBLCP |d YDXCP |d OCLCO |d TEFOD |d N$T |d AZK |d COO |d DEBBG |d IDB |d LIV |d MERUC |d OCLCQ |d IOG |d OCLCA |d SNK |d DKU |d INTCL |d MHW |d IGB |d D6H |d VVB |d VTS |d UOK |d CEF |d WAU |d VT2 |d CN8ML |d AGLDB |d OCLCQ |d WYU |d S8J |d C6I |d STF |d UKAHL |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d DEGRU |d OCLCF |d OCLCO | ||
019 | |a 936410849 |a 941700558 |a 951674586 |a 961695792 |a 966353490 |a 1008948925 |a 1166386182 | ||
020 | |a 9781849287906 |q (electronic bk.) | ||
020 | |a 1849287902 |q (electronic bk.) | ||
020 | |a 9781849287913 | ||
020 | |a 1849287910 | ||
020 | |z 9781849287890 | ||
020 | |z 1849287899 | ||
029 | 1 | |a AU@ |b 000060760387 | |
029 | 1 | |a AU@ |b 000066770487 | |
029 | 1 | |a CHNEW |b 000895039 | |
029 | 1 | |a CHVBK |b 374539693 | |
029 | 1 | |a DEBBG |b BV043968865 | |
029 | 1 | |a DEBSZ |b 485793776 | |
029 | 1 | |a GBVCP |b 882848607 | |
035 | |a (OCoLC)937390335 |z (OCoLC)936410849 |z (OCoLC)941700558 |z (OCoLC)951674586 |z (OCoLC)961695792 |z (OCoLC)966353490 |z (OCoLC)1008948925 |z (OCoLC)1166386182 | ||
037 | |a CL0500000714 |b Safari Books Online | ||
037 | |a 22573/ctt19dgmt1 |b JSTOR | ||
037 | |a 69776C99-F2DE-453F-975A-7ED20E394032 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b Z56 2016 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Zinatullin, Leron, |e author. | |
245 | 1 | 4 | |a The psychology of information security : |b resolving conflicts between security compliance and human behaviour / |c Leron Zinatullin. |
264 | 1 | |a Ely, Cambridgeshire : |b IT Governance Publishing, |c 2016. | |
300 | |a 1 online resource (xiv, 112 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
520 | |a Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. -- |c Edited summary from book. | ||
505 | 0 | |a Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security. | |
588 | 0 | |a Print version record. | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a JSTOR |b Books at JSTOR Demand Driven Acquisitions (DDA) | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Information technology |x Security measures |x Psychological aspects. | |
650 | 0 | |a Computer security |x Psychological aspects. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures |x Aspect psychologique. | |
650 | 6 | |a Sécurité informatique |x Aspect psychologique. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |x Psychological aspects |2 fast | |
776 | 0 | 8 | |i Print version: |a Zinatullin, Leron. |t Psychology of information security. |d Ely, Cambridgeshire : It Governance Pub, 2016 |z 1849287899 |w (OCoLC)934743767 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781849287913/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4395809 |z Texto completo |
938 | |a De Gruyter |b DEGR |n 9781849287906 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH36161743 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH30625668 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4395809 | ||
938 | |a EBSCOhost |b EBSC |n 1161980 | ||
938 | |a YBP Library Services |b YANK |n 12823213 | ||
994 | |a 92 |b IZTAP |