Cargando…

Security : the Human Factor.

This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kearney, Paul
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely : IT Governance Pub., 2010.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 JSTOR_ocn700706573
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |n|---|||||
008 110205s2010 xx ob 000 0 eng d
040 |a MERUC  |b eng  |e pn  |c MERUC  |d EBLCP  |d STF  |d OCLCQ  |d N$T  |d B24X7  |d E7B  |d OCLCQ  |d UMI  |d DEBSZ  |d JSTOR  |d OCLCF  |d OCLCO  |d OCLCQ  |d YDXCP  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d AGLDB  |d Z5A  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d VNS  |d VTS  |d CEF  |d OCLCQ  |d LVT  |d UAB  |d M8D  |d UKAHL  |d OCLCQ  |d MM9  |d UX1  |d TUHNV  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 794491659  |a 857306731  |a 904210467  |a 1175629223  |a 1243609630 
020 |a 9781849280648  |q (electronic bk.) 
020 |a 1849280649  |q (electronic bk.) 
020 |z 1849280630 
020 |z 9781849280631 
029 1 |a AU@  |b 000049149595 
029 1 |a AU@  |b 000051448137 
029 1 |a AU@  |b 000052006908 
029 1 |a AU@  |b 000060584911 
029 1 |a AU@  |b 000065313112 
029 1 |a DEBBG  |b BV041431770 
029 1 |a DEBBG  |b BV042969632 
029 1 |a DEBSZ  |b 396943624 
029 1 |a DEBSZ  |b 39827634X 
029 1 |a DEBSZ  |b 421529016 
029 1 |a AU@  |b 000067092817 
035 |a (OCoLC)700706573  |z (OCoLC)794491659  |z (OCoLC)857306731  |z (OCoLC)904210467  |z (OCoLC)1175629223  |z (OCoLC)1243609630 
037 |a CL0500000268  |b Safari Books Online 
037 |a 22573/ctt4k5gfc  |b JSTOR 
050 4 |a HD30.2  |b .K43 2010eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8019 
049 |a UAMI 
100 1 |a Kearney, Paul. 
245 1 0 |a Security :  |b the Human Factor. 
260 |a Ely :  |b IT Governance Pub.,  |c 2010. 
300 |a 1 online resource (60 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources. 
520 |a This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives. 
588 0 |a Print version record. 
504 |a Includes bibliographical references. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Information technology  |x Management. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Gestion. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Kearney, Paul.  |t Security : The Human Factor.  |d Ely : IT Governance Publishing, ©2010  |z 9781849280631 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh5gj  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26134990 
938 |a Books 24x7  |b B247  |n bks00041214 
938 |a EBL - Ebook Library  |b EBLB  |n EBL647939 
938 |a ebrary  |b EBRY  |n ebr10554860 
938 |a EBSCOhost  |b EBSC  |n 391155 
938 |a YBP Library Services  |b YANK  |n 3615238 
994 |a 92  |b IZTAP