|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1100071283 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
190506s2019 inua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d EBLCP
|d DG1
|d YDX
|d UKAHL
|d RECBK
|d OCLCF
|d OCLCQ
|d CNO
|d OCLCQ
|d UX1
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1175644599
|
020 |
|
|
|a 9781119566373
|q (electronic bk.)
|
020 |
|
|
|a 1119566371
|q (electronic bk.)
|
020 |
|
|
|a 9781119566380
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 111956638X
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 1119566347
|q (Trade Paper)
|
020 |
|
|
|a 9781119566342
|
020 |
|
|
|z 9781119566342
|
024 |
3 |
|
|a 9781119566342
|
029 |
1 |
|
|a AU@
|b 000065375682
|
029 |
1 |
|
|a CHNEW
|b 001055854
|
029 |
1 |
|
|a CHSLU
|b 001392610
|
029 |
1 |
|
|a CHVBK
|b 568742605
|
029 |
1 |
|
|a CHVBK
|b 586910603
|
035 |
|
|
|a (OCoLC)1100071283
|z (OCoLC)1175644599
|
037 |
|
|
|b 00028608
|
050 |
|
4 |
|a QA76.9.A25
|b C37 2019eb
|
072 |
|
7 |
|a BUS
|x 087000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 046000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Carpenter, Perry,
|e author.
|
245 |
1 |
0 |
|a Transformational security awareness :
|b what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors /
|c Perry Carpenter.
|
264 |
|
1 |
|a Indianapolis, IN :
|b Wiley,
|c 2019.
|
300 |
|
|
|a 1 online resource (341 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
|
|
|a Online resource; title from PDF title page (EBSCO, viewed May 7, 2019).
|
520 |
|
|
|a Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them' Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization.-Find out what you need to know about marketing, communication, behavior science, and culture management -Overcome the knowledge-intention-behavior gap -Optimize your program to work with the realities of human nature -Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness -Put effective training together into a well-crafted campaign with ambassadors -Understand the keys to sustained success and ongoing culture change -Measure your success and establish continuous improvements Do you care more about what your employees know or what they do' It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Production & Operations Management.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119566342/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35581876
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35581877
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5763515
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2116156
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00759906
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16236158
|
994 |
|
|
|a 92
|b IZTAP
|