|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn990182942 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
170616s2017 xxu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d EBLCP
|d GW5XE
|d OCLCF
|d UAB
|d YDX
|d NJR
|d MERER
|d ESU
|d OCLCQ
|d NUI
|d COO
|d AZU
|d UPM
|d OCLCQ
|d VT2
|d IOG
|d K6U
|d IDB
|d MERUC
|d OCLCA
|d LIV
|d U3W
|d D6H
|d CAUOI
|d OCLCQ
|d VVB
|d KSU
|d AU@
|d WYU
|d UKMGB
|d UMI
|d TOH
|d UKAHL
|d C6I
|d LEAUB
|d UHL
|d LEATE
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AUD
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB8M4564
|2 bnb
|
016 |
7 |
|
|a 019140070
|2 Uk
|
019 |
|
|
|a 990518591
|a 996413002
|a 1005809827
|a 1011908770
|a 1058532663
|a 1066550676
|a 1076922407
|a 1086505454
|a 1112860400
|a 1112955201
|a 1122817049
|a 1125688864
|a 1136362950
|
020 |
|
|
|a 9781484228357
|q (electronic bk.)
|
020 |
|
|
|a 1484228359
|q (electronic bk.)
|
020 |
|
|
|a 1484228340
|
020 |
|
|
|a 9781484228340
|
020 |
|
|
|z 9781484228340
|
024 |
7 |
|
|a 10.1007/978-1-4842-2835-7
|2 doi
|
024 |
3 |
|
|a 9781484228340
|
029 |
1 |
|
|a AU@
|b 000060467047
|
029 |
1 |
|
|a CHNEW
|b 000962018
|
029 |
1 |
|
|a CHVBK
|b 491706480
|
029 |
1 |
|
|a UKMGB
|b 019140070
|
029 |
1 |
|
|a AU@
|b 000065065747
|
029 |
1 |
|
|a AU@
|b 000066230520
|
029 |
1 |
|
|a AU@
|b 000072973048
|
029 |
1 |
|
|a AU@
|b 000069009859
|
035 |
|
|
|a (OCoLC)990182942
|z (OCoLC)990518591
|z (OCoLC)996413002
|z (OCoLC)1005809827
|z (OCoLC)1011908770
|z (OCoLC)1058532663
|z (OCoLC)1066550676
|z (OCoLC)1076922407
|z (OCoLC)1086505454
|z (OCoLC)1112860400
|z (OCoLC)1112955201
|z (OCoLC)1122817049
|z (OCoLC)1125688864
|z (OCoLC)1136362950
|
037 |
|
|
|a 9781484228340
|b 00152887
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Schroeder, Jordan,
|e author.
|
245 |
1 |
0 |
|a Advanced persistent training :
|b take your security awareness program to the next level /
|c Jordan Schroeder.
|
264 |
|
1 |
|a [United States] :
|b Apress,
|c 2017.
|
264 |
|
2 |
|a New York, NY :
|b Distributed to the Book trade worldwide by Springer
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (Ebsco; title viewed on June 20, 2017).
|
505 |
0 |
|
|a At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System.
|
505 |
8 |
|
|a Chapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks.
|
505 |
8 |
|
|a CopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Work?; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters.
|
505 |
8 |
|
|a Wombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index.
|
520 |
|
|
|a Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Computer Applications.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Information technology: general issues.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484228340
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484228357/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33062903
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4877842
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1534769
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14580486
|
994 |
|
|
|a 92
|b IZTAP
|