• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training

    Cyber Security Culture by Trim, Peter; Upton, David;

    Counteracting Cyber Threats through Organizational Learning and Training

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 150.00
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        71 662 Ft (68 250 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 14 332 Ft off)
      • Kedvezményes ár 57 330 Ft (54 600 Ft + 5% áfa)

    71 662 Ft

    db

    Beszerezhetőség

    Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
    A Prosperónál jelenleg nincsen raktáron.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    Rövid leírás:

    Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises. Although the work is embedded in a theoretical framework, non-technical staff will find the book accessible and it links firmly with areas beyond ICT, such as human resource management. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science. The knowledge provided will appeal to an international audience.

    Több

    Hosszú leírás:

    Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.

    ’This excellent book comes at a time when cyber security is paramount in the concerns of all organisations that handle information as an asset - that should be all of us. Relying on technical threat mitigation is not enough. What is required is a change of culture and this book is a first class exemplar of how to do this though changing the way we organise ourselves and how we train to address modern threats. It is a book for everyone with an interest in safeguarding their business and their organisation.’ Neil Fisher, Vice Chairman, Information Assurance Advisory Council ’Protecting critical information infrastructure will be a vital component of business, organisational and national security in the 21st century. Cyber threats - from hacking, terrorism, sabotage or espionage - are already widespread and on the increase, yet many organisations remain poorly prepared for dealing with such attacks. Trim and Upton’s timely book takes a reasoned, well informed and practical approach to this complex topic, providing useful guidance to managers and emphasising an organisational learning approach.’ John Twigg, University College London, UK ’This is a thoughtful and practical approach to handling cyber security incidents. Incident management is fast moving requiring quick decision making which is directly dependent on knowledge and confidence. Building confidence through training and exercising is a valuable initiative.’ Bruno Brunskill, Company Secretary, Information Assurance Advisory Council (IAAC)

    Több

    Tartalomjegyzék:

    Chapter 1 Introduction and Background to the Research; Chapter 2 Social Engineering; Chapter 3 Organizational Issues Relating to Critical Information Infrastructure Protection; Chapter 4 Protecting Critical Information Infrastructure: Issues and Considerations; Chapter 5 Critical Information Infrastructure: Methods of Conceptualizing Interdependencies that No One Person Fully Understands; Chapter 6 Insights into Organizational Learning; Chapter 7 Critical Information Infrastructure Road Map; Chapter 8 The Learning Organization and Managing Change; Chapter 9 Devising an Effective Counter Threat Strategy;

    Több