Security: the Human Factor
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2010
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (60 pages) |
ISBN: | 9781849280648 1849280649 1849280630 9781849280631 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042969632 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151030s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781849280648 |c electronic bk. |9 978-1-84928-064-8 | ||
020 | |a 1849280649 |c electronic bk. |9 1-84928-064-9 | ||
020 | |a 1849280630 |9 1-84928-063-0 | ||
020 | |a 9781849280631 |9 978-1-84928-063-1 | ||
035 | |a (OCoLC)700706573 | ||
035 | |a (DE-599)BVBBV042969632 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8019 | |
100 | 1 | |a Kearney, Paul |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security |b the Human Factor |
264 | 1 | |a Ely |b IT Governance Pub. |c 2010 | |
300 | |a 1 Online-Ressource (60 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources | ||
500 | |a This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives | ||
500 | |a Includes bibliographical references | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Information technology / Management | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 7 | |a Information technology / Management |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Information technology |x Management | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391155 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA |a ZDB-4-EBU | ||
940 | 1 | |q FAW_PDA_EBA | |
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028395499 |
Datensatz im Suchindex
_version_ | 1804175298937225216 |
---|---|
any_adam_object | |
author | Kearney, Paul |
author_facet | Kearney, Paul |
author_role | aut |
author_sort | Kearney, Paul |
author_variant | p k pk |
building | Verbundindex |
bvnumber | BV042969632 |
collection | ZDB-4-EBA ZDB-4-EBU |
ctrlnum | (OCoLC)700706573 (DE-599)BVBBV042969632 |
dewey-full | 005.8019 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8019 |
dewey-search | 005.8019 |
dewey-sort | 15.8019 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02793nmm a2200565zc 4500</leader><controlfield tag="001">BV042969632</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280648</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-064-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280649</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-064-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280630</subfield><subfield code="9">1-84928-063-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280631</subfield><subfield code="9">978-1-84928-063-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700706573</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042969632</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8019</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kearney, Paul</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security</subfield><subfield code="b">the Human Factor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (60 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391155</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_EBA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028395499</subfield></datafield></record></collection> |
id | DE-604.BV042969632 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:14:04Z |
institution | BVB |
isbn | 9781849280648 1849280649 1849280630 9781849280631 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028395499 |
oclc_num | 700706573 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (60 pages) |
psigel | ZDB-4-EBA ZDB-4-EBU FAW_PDA_EBA FLA_PDA_EBU |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Kearney, Paul Verfasser aut Security the Human Factor Ely IT Governance Pub. 2010 1 Online-Ressource (60 pages) txt rdacontent c rdamedia cr rdacarrier Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives Includes bibliographical references Computer science Information technology / Security measures Business enterprises / Computer networks / Security measures Information technology / Management COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Business enterprises / Computer networks / Security measures fast Information technology / Management fast Information technology / Security measures fast Informatik Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Information technology Management http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391155 Aggregator Volltext |
spellingShingle | Kearney, Paul Security the Human Factor Computer science Information technology / Security measures Business enterprises / Computer networks / Security measures Information technology / Management COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Business enterprises / Computer networks / Security measures fast Information technology / Management fast Information technology / Security measures fast Informatik Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Information technology Management |
title | Security the Human Factor |
title_auth | Security the Human Factor |
title_exact_search | Security the Human Factor |
title_full | Security the Human Factor |
title_fullStr | Security the Human Factor |
title_full_unstemmed | Security the Human Factor |
title_short | Security |
title_sort | security the human factor |
title_sub | the Human Factor |
topic | Computer science Information technology / Security measures Business enterprises / Computer networks / Security measures Information technology / Management COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Business enterprises / Computer networks / Security measures fast Information technology / Management fast Information technology / Security measures fast Informatik Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Information technology Management |
topic_facet | Computer science Information technology / Security measures Business enterprises / Computer networks / Security measures Information technology / Management COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Informatik Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Information technology Management |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391155 |
work_keys_str_mv | AT kearneypaul securitythehumanfactor |