Cyber Security Culture
Counteracting Cyber Threats through Organizational Learning and Training
-
20% KEDVEZMÉNY?
- A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
- Kiadói listaár GBP 150.00
-
71 662 Ft (68 250 Ft + 5% áfa)
Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.
- Kedvezmény(ek) 20% (cc. 14 332 Ft off)
- Kedvezményes ár 57 330 Ft (54 600 Ft + 5% áfa)
Iratkozzon fel most és részesüljön kedvezőbb árainkból!
Feliratkozom
71 662 Ft
Beszerezhetőség
Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
A Prosperónál jelenleg nincsen raktáron.
Why don't you give exact delivery time?
A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.
A termék adatai:
- Kiadás sorszáma 1
- Kiadó Routledge
- Megjelenés dátuma 2013. április 11.
- ISBN 9781409456940
- Kötéstípus Keménykötés
- Terjedelem240 oldal
- Méret 246x174 mm
- Súly 600 g
- Nyelv angol 0
Kategóriák
Rövid leírás:
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises. Although the work is embedded in a theoretical framework, non-technical staff will find the book accessible and it links firmly with areas beyond ICT, such as human resource management. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science. The knowledge provided will appeal to an international audience.
TöbbHosszú leírás:
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.
’This excellent book comes at a time when cyber security is paramount in the concerns of all organisations that handle information as an asset - that should be all of us. Relying on technical threat mitigation is not enough. What is required is a change of culture and this book is a first class exemplar of how to do this though changing the way we organise ourselves and how we train to address modern threats. It is a book for everyone with an interest in safeguarding their business and their organisation.’ Neil Fisher, Vice Chairman, Information Assurance Advisory Council ’Protecting critical information infrastructure will be a vital component of business, organisational and national security in the 21st century. Cyber threats - from hacking, terrorism, sabotage or espionage - are already widespread and on the increase, yet many organisations remain poorly prepared for dealing with such attacks. Trim and Upton’s timely book takes a reasoned, well informed and practical approach to this complex topic, providing useful guidance to managers and emphasising an organisational learning approach.’ John Twigg, University College London, UK ’This is a thoughtful and practical approach to handling cyber security incidents. Incident management is fast moving requiring quick decision making which is directly dependent on knowledge and confidence. Building confidence through training and exercising is a valuable initiative.’ Bruno Brunskill, Company Secretary, Information Assurance Advisory Council (IAAC)
Tartalomjegyzék:
Chapter 1 Introduction and Background to the Research; Chapter 2 Social Engineering; Chapter 3 Organizational Issues Relating to Critical Information Infrastructure Protection; Chapter 4 Protecting Critical Information Infrastructure: Issues and Considerations; Chapter 5 Critical Information Infrastructure: Methods of Conceptualizing Interdependencies that No One Person Fully Understands; Chapter 6 Insights into Organizational Learning; Chapter 7 Critical Information Infrastructure Road Map; Chapter 8 The Learning Organization and Managing Change; Chapter 9 Devising an Effective Counter Threat Strategy;
Több
International Labour Law Reports, Volume 42
176 268 Ft
162 167 Ft
The Spoon in the Stone: A Lesson in Serving Others
1 403 Ft
1 291 Ft