|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910460337503321 |
|
|
Autore |
Kearney Paul |
|
|
Titolo |
Security [[electronic resource] ] : the human factor / / Paul Kearney |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Ely, Cambridgeshire, : IT Governance Pub., 2010 |
|
|
|
|
|
|
|
ISBN |
|
1-84928-184-X |
1-283-00638-3 |
9786613006387 |
1-84928-064-9 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (60 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Business enterprises - Computer networks - Security measures |
Information technology - Security measures |
Information technology - Management |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally...; ITG Resources |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives. |
|
|
|
|
|
|
|