|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1223091856 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201121s2020 nyu o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d YDX
|d UPM
|d OCLCO
|d OCLCF
|d N$T
|d LIP
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1196375394
|
020 |
|
|
|a 1952538432
|
020 |
|
|
|a 9781952538438
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000070077881
|
035 |
|
|
|a (OCoLC)1223091856
|z (OCoLC)1196375394
|
050 |
|
4 |
|a QA76.9.A25
|b B76 2020eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Brown, Steven.
|
245 |
1 |
0 |
|a Successful Cybersecurity Management
|h [electronic resource] :
|b How To Change Your Behavior to Protect Your Organization.
|
260 |
|
|
|a New York :
|b Business Expert Press,
|c 2020.
|
300 |
|
|
|a 1 online resource (282 p.).
|
490 |
1 |
|
|a Issn Ser.
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Chapter 1. Cybersecurity and behavior -- Chapter 2. Behaviorism -- Chapter 3. Traits -- Chapter 4. Perceptions -- Chapter 5. So, how do we even think? -- Chapter 6. Memory -- Chapter 7. How are we motivated -- Chapter 8. Social influence -- Chapter 9. Stereotypes -- Chapter 10. Fight or flight -- Chapter 11. Language -- Chapter 12. Differences in opinion -- Chapter 13. Cyber maturity and ethics -- Chapter 14. Theory of cybersecurity -- Chapter 15. Future.
|
520 |
3 |
|
|a This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals' behavior, but our behavior as well, and to realize that some of behaviors could lead us in making bad cybersecurity decisions. Dr. Brown also presents even a possible theory of cybersecurity. Key areas include: Behaviorism, Learning models, Cybersecurity vulnerabilities, Stereotypes, Cybersecurity traits, Conditioned response, Social engineering, Deep fakes.By using models and literature rooted in psychology and comparing those to cybersecurity attacks, this book will help those who make crucial cybersecurity decisions to protect their organization, even better decisions.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer fraud.
|
650 |
|
0 |
|a Social engineering.
|
650 |
|
0 |
|a Self-protective behavior.
|
650 |
|
0 |
|a Decision making.
|
650 |
|
0 |
|a Human behavior.
|
650 |
|
0 |
|a Cognition.
|
650 |
|
0 |
|a Neurosciences.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Decision Making
|
650 |
|
2 |
|a Behavior
|
650 |
|
2 |
|a Cognition
|
650 |
|
2 |
|a Neurosciences
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Fraude informatique.
|
650 |
|
6 |
|a Ingénierie sociale.
|
650 |
|
6 |
|a Autoprotection.
|
650 |
|
6 |
|a Prise de décision.
|
650 |
|
6 |
|a Comportement humain.
|
650 |
|
6 |
|a Cognition.
|
650 |
|
6 |
|a Neurosciences.
|
650 |
|
7 |
|a decision making.
|2 aat
|
650 |
|
7 |
|a human behavior.
|2 aat
|
650 |
|
7 |
|a cognition.
|2 aat
|
650 |
|
7 |
|a Cognition
|2 fast
|
650 |
|
7 |
|a Computer fraud
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Decision making
|2 fast
|
650 |
|
7 |
|a Human behavior
|2 fast
|
650 |
|
7 |
|a Neurosciences
|2 fast
|
650 |
|
7 |
|a Self-protective behavior
|2 fast
|
650 |
|
7 |
|a Social engineering
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Brown, Steven
|t Successful Cybersecurity Management : How To Change Your Behavior to Protect Your Organization
|d New York : Business Expert Press,c2020
|
830 |
|
0 |
|a Issn Ser.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6352009
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6352009
|
938 |
|
|
|a Business Expert Press
|b BEPR
|n 9781952538438
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301542059
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2627851
|
994 |
|
|
|a 92
|b IZTAP
|