Building an information security awareness program: defending against social engineering and technical threats
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Massachusetts
Syngress
2014
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization''s staff of the risk and educate them on how to protect your organization''s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (215 pages) |
ISBN: | 9780124199811 012419981X 1322053804 9781322053806 9780124199675 0124199674 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300258 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780124199811 |c electronic bk. |9 978-0-12-419981-1 | ||
020 | |a 012419981X |c electronic bk. |9 0-12-419981-X | ||
020 | |a 1322053804 |c ebk |9 1-322-05380-4 | ||
020 | |a 9781322053806 |c ebk |9 978-1-322-05380-6 | ||
020 | |a 9780124199675 |9 978-0-12-419967-5 | ||
020 | |a 0124199674 |9 0-12-419967-4 | ||
020 | |a 9780124199675 |9 978-0-12-419967-5 | ||
035 | |a (ZDB-33-EBS)ocn887508524 | ||
035 | |a (OCoLC)887508524 | ||
035 | |a (DE-599)BVBBV042300258 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.3/1244 |2 22 | |
100 | 1 | |a Gardner, Bill, (Bill G.) |e Verfasser |4 aut | |
245 | 1 | 0 | |a Building an information security awareness program |b defending against social engineering and technical threats |c Bill Gardner, Valerie Thomas |
264 | 1 | |a Waltham, Massachusetts |b Syngress |c 2014 | |
300 | |a 1 Online-Ressource (215 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization''s staff of the risk and educate them on how to protect your organization''s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer Security | |
650 | 4 | |a Social Sciences | |
650 | 4 | |a Online social networks / Security measures | |
650 | 4 | |a Situational awareness | |
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Information storage and retrieval systems / Security measures |2 local | |
650 | 7 | |a Online social networks / Security measures |2 local | |
650 | 7 | |a Safety education |2 local | |
650 | 7 | |a Occupational training |2 local | |
650 | 7 | |a Situational awareness |2 local | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Information storage and retrieval systems |x Security measures | |
650 | 4 | |a Online social networks |x Security measures | |
650 | 4 | |a Safety education | |
650 | 4 | |a Occupational training | |
650 | 4 | |a Situational awareness | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mitarbeiter |0 (DE-588)4120744-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Mitarbeiter |0 (DE-588)4120744-0 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Thomas, Valerie |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124199675 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737250 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804152877458915328 |
---|---|
any_adam_object | |
author | Gardner, Bill, (Bill G.) |
author_facet | Gardner, Bill, (Bill G.) |
author_role | aut |
author_sort | Gardner, Bill, (Bill G.) |
author_variant | b b g g bbg bbgg |
building | Verbundindex |
bvnumber | BV042300258 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn887508524 (OCoLC)887508524 (DE-599)BVBBV042300258 |
dewey-full | 658.3/1244 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.3/1244 |
dewey-search | 658.3/1244 |
dewey-sort | 3658.3 41244 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03825nmm a2200805zc 4500</leader><controlfield tag="001">BV042300258</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124199811</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-419981-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012419981X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-419981-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1322053804</subfield><subfield code="c">ebk</subfield><subfield code="9">1-322-05380-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322053806</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-322-05380-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124199675</subfield><subfield code="9">978-0-12-419967-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124199674</subfield><subfield code="9">0-12-419967-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124199675</subfield><subfield code="9">978-0-12-419967-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn887508524</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)887508524</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300258</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.3/1244</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gardner, Bill, (Bill G.)</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building an information security awareness program</subfield><subfield code="b">defending against social engineering and technical threats</subfield><subfield code="c">Bill Gardner, Valerie Thomas</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (215 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization''s staff of the risk and educate them on how to protect your organization''s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online social networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Situational awareness</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information storage and retrieval systems / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Online social networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Safety education</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Occupational training</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Situational awareness</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online social networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Safety education</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Occupational training</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Situational awareness</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mitarbeiter</subfield><subfield code="0">(DE-588)4120744-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mitarbeiter</subfield><subfield code="0">(DE-588)4120744-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thomas, Valerie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124199675</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737250</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042300258 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9780124199811 012419981X 1322053804 9781322053806 9780124199675 0124199674 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737250 |
oclc_num | 887508524 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (215 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Gardner, Bill, (Bill G.) Verfasser aut Building an information security awareness program defending against social engineering and technical threats Bill Gardner, Valerie Thomas Waltham, Massachusetts Syngress 2014 1 Online-Ressource (215 pages) txt rdacontent c rdamedia cr rdacarrier The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization''s staff of the risk and educate them on how to protect your organization''s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to Includes bibliographical references and index Computer Security Social Sciences Online social networks / Security measures Situational awareness BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Information storage and retrieval systems / Security measures local Online social networks / Security measures local Safety education local Occupational training local Situational awareness local Wirtschaft Information storage and retrieval systems Security measures Online social networks Security measures Safety education Occupational training Datensicherung (DE-588)4011144-1 gnd rswk-swf Mitarbeiter (DE-588)4120744-0 gnd rswk-swf Social Engineering Sicherheit (DE-588)7539699-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Mitarbeiter (DE-588)4120744-0 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Social Engineering Sicherheit (DE-588)7539699-3 s 1\p DE-604 Thomas, Valerie Sonstige oth http://www.sciencedirect.com/science/book/9780124199675 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gardner, Bill, (Bill G.) Building an information security awareness program defending against social engineering and technical threats Computer Security Social Sciences Online social networks / Security measures Situational awareness BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Information storage and retrieval systems / Security measures local Online social networks / Security measures local Safety education local Occupational training local Situational awareness local Wirtschaft Information storage and retrieval systems Security measures Online social networks Security measures Safety education Occupational training Datensicherung (DE-588)4011144-1 gnd Mitarbeiter (DE-588)4120744-0 gnd Social Engineering Sicherheit (DE-588)7539699-3 gnd Computersicherheit (DE-588)4274324-2 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4120744-0 (DE-588)7539699-3 (DE-588)4274324-2 (DE-588)4061963-1 |
title | Building an information security awareness program defending against social engineering and technical threats |
title_auth | Building an information security awareness program defending against social engineering and technical threats |
title_exact_search | Building an information security awareness program defending against social engineering and technical threats |
title_full | Building an information security awareness program defending against social engineering and technical threats Bill Gardner, Valerie Thomas |
title_fullStr | Building an information security awareness program defending against social engineering and technical threats Bill Gardner, Valerie Thomas |
title_full_unstemmed | Building an information security awareness program defending against social engineering and technical threats Bill Gardner, Valerie Thomas |
title_short | Building an information security awareness program |
title_sort | building an information security awareness program defending against social engineering and technical threats |
title_sub | defending against social engineering and technical threats |
topic | Computer Security Social Sciences Online social networks / Security measures Situational awareness BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Information storage and retrieval systems / Security measures local Online social networks / Security measures local Safety education local Occupational training local Situational awareness local Wirtschaft Information storage and retrieval systems Security measures Online social networks Security measures Safety education Occupational training Datensicherung (DE-588)4011144-1 gnd Mitarbeiter (DE-588)4120744-0 gnd Social Engineering Sicherheit (DE-588)7539699-3 gnd Computersicherheit (DE-588)4274324-2 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Computer Security Social Sciences Online social networks / Security measures Situational awareness BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Information storage and retrieval systems / Security measures Safety education Occupational training Wirtschaft Information storage and retrieval systems Security measures Online social networks Security measures Datensicherung Mitarbeiter Social Engineering Sicherheit Computersicherheit Unternehmen |
url | http://www.sciencedirect.com/science/book/9780124199675 |
work_keys_str_mv | AT gardnerbillbillg buildinganinformationsecurityawarenessprogramdefendingagainstsocialengineeringandtechnicalthreats AT thomasvalerie buildinganinformationsecurityawarenessprogramdefendingagainstsocialengineeringandtechnicalthreats |