Cybersecurity education for awareness and compliance:
"This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consi...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext |
Zusammenfassung: | "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"... |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522578482 |
DOI: | 10.4018/978-1-5225-7847-5 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV045539416 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 190402s2019 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522578482 |9 978-1-5225-7848-2 | ||
035 | |a (OCoLC)1091670270 | ||
035 | |a (DE-599)BVBBV045539416 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
050 | 0 | |a HD30.38 | |
082 | 0 | |a 658.3/124 |2 23 | |
245 | 1 | 0 | |a Cybersecurity education for awareness and compliance |c Ismini Vasileiou, Steven Furnell |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"... | ||
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Employees |x Training of | |
650 | 4 | |a Employee rules | |
700 | 1 | |a Vasileiou, Ismini |d 1980- |4 edt | |
700 | 1 | |a Furnell, Steven |d 1970- |0 (DE-588)1038562899 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, h/c |z 978-1-5225-7847-5 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-7847-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-706 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079018643390464 |
---|---|
adam_text | |
any_adam_object | |
author2 | Vasileiou, Ismini 1980- Furnell, Steven 1970- |
author2_role | edt edt |
author2_variant | i v iv s f sf |
author_GND | (DE-588)1038562899 |
author_facet | Vasileiou, Ismini 1980- Furnell, Steven 1970- |
building | Verbundindex |
bvnumber | BV045539416 |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.38 |
callnumber-search | HD30.38 |
callnumber-sort | HD 230.38 |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1091670270 (DE-599)BVBBV045539416 |
dewey-full | 658.3/124 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.3/124 |
dewey-search | 658.3/124 |
dewey-sort | 3658.3 3124 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-5225-7847-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV045539416</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190402s2019 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522578482</subfield><subfield code="9">978-1-5225-7848-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1091670270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045539416</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD30.38</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.3/124</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity education for awareness and compliance</subfield><subfield code="c">Ismini Vasileiou, Steven Furnell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employees</subfield><subfield code="x">Training of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee rules</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vasileiou, Ismini</subfield><subfield code="d">1980-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)1038562899</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, h/c</subfield><subfield code="z">978-1-5225-7847-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045539416 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:19Z |
institution | BVB |
isbn | 9781522578482 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030923368 |
oclc_num | 1091670270 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Cybersecurity education for awareness and compliance Ismini Vasileiou, Steven Furnell Hershey, PA IGI Global [2019] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"... Business enterprises Computer networks Security measures Information technology Security measures Employees Training of Employee rules Vasileiou, Ismini 1980- edt Furnell, Steven 1970- (DE-588)1038562899 edt Erscheint auch als Druck-Ausgabe, h/c 978-1-5225-7847-5 https://doi.org/10.4018/978-1-5225-7847-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cybersecurity education for awareness and compliance Business enterprises Computer networks Security measures Information technology Security measures Employees Training of Employee rules |
title | Cybersecurity education for awareness and compliance |
title_auth | Cybersecurity education for awareness and compliance |
title_exact_search | Cybersecurity education for awareness and compliance |
title_full | Cybersecurity education for awareness and compliance Ismini Vasileiou, Steven Furnell |
title_fullStr | Cybersecurity education for awareness and compliance Ismini Vasileiou, Steven Furnell |
title_full_unstemmed | Cybersecurity education for awareness and compliance Ismini Vasileiou, Steven Furnell |
title_short | Cybersecurity education for awareness and compliance |
title_sort | cybersecurity education for awareness and compliance |
topic | Business enterprises Computer networks Security measures Information technology Security measures Employees Training of Employee rules |
topic_facet | Business enterprises Computer networks Security measures Information technology Security measures Employees Training of Employee rules |
url | https://doi.org/10.4018/978-1-5225-7847-5 |
work_keys_str_mv | AT vasileiouismini cybersecurityeducationforawarenessandcompliance AT furnellsteven cybersecurityeducationforawarenessandcompliance |