Cargando…

The psychology of information security : resolving conflicts between security compliance and human behaviour /

Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Zinatullin, Leron (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire : IT Governance Publishing, 2016.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn937390335
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 160208s2016 enka ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d JSTOR  |d OCLCO  |d EBLCP  |d YDXCP  |d OCLCO  |d TEFOD  |d N$T  |d AZK  |d COO  |d DEBBG  |d IDB  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d SNK  |d DKU  |d INTCL  |d MHW  |d IGB  |d D6H  |d VVB  |d VTS  |d UOK  |d CEF  |d WAU  |d VT2  |d CN8ML  |d AGLDB  |d OCLCQ  |d WYU  |d S8J  |d C6I  |d STF  |d UKAHL  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d DEGRU  |d OCLCF  |d OCLCO 
019 |a 936410849  |a 941700558  |a 951674586  |a 961695792  |a 966353490  |a 1008948925  |a 1166386182 
020 |a 9781849287906  |q (electronic bk.) 
020 |a 1849287902  |q (electronic bk.) 
020 |a 9781849287913 
020 |a 1849287910 
020 |z 9781849287890 
020 |z 1849287899 
029 1 |a AU@  |b 000060760387 
029 1 |a AU@  |b 000066770487 
029 1 |a CHNEW  |b 000895039 
029 1 |a CHVBK  |b 374539693 
029 1 |a DEBBG  |b BV043968865 
029 1 |a DEBSZ  |b 485793776 
029 1 |a GBVCP  |b 882848607 
035 |a (OCoLC)937390335  |z (OCoLC)936410849  |z (OCoLC)941700558  |z (OCoLC)951674586  |z (OCoLC)961695792  |z (OCoLC)966353490  |z (OCoLC)1008948925  |z (OCoLC)1166386182 
037 |a CL0500000714  |b Safari Books Online 
037 |a 22573/ctt19dgmt1  |b JSTOR 
037 |a 69776C99-F2DE-453F-975A-7ED20E394032  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b Z56 2016 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Zinatullin, Leron,  |e author. 
245 1 4 |a The psychology of information security :  |b resolving conflicts between security compliance and human behaviour /  |c Leron Zinatullin. 
264 1 |a Ely, Cambridgeshire :  |b IT Governance Publishing,  |c 2016. 
300 |a 1 online resource (xiv, 112 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
520 |a Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --  |c Edited summary from book. 
505 0 |a Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Information technology  |x Security measures  |x Psychological aspects. 
650 0 |a Computer security  |x Psychological aspects. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures  |x Aspect psychologique. 
650 6 |a Sécurité informatique  |x Aspect psychologique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Psychological aspects  |2 fast 
776 0 8 |i Print version:  |a Zinatullin, Leron.  |t Psychology of information security.  |d Ely, Cambridgeshire : It Governance Pub, 2016  |z 1849287899  |w (OCoLC)934743767 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849287913/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4395809  |z Texto completo 
938 |a De Gruyter  |b DEGR  |n 9781849287906 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36161743 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30625668 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4395809 
938 |a EBSCOhost  |b EBSC  |n 1161980 
938 |a YBP Library Services  |b YANK  |n 12823213 
994 |a 92  |b IZTAP