Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity |
Autore | Garber Leeza |
Edizione | [First edition.] |
Pubbl/distr/stampa | New York : , : Business Expert Press, , 2021 |
Descrizione fisica | 1 online resource (224 pages) |
Disciplina | 005.80683 |
Altri autori (Persone) | OlsonScott |
Collana | Business law and corporate risk |
Soggetto topico |
Computer security - Personnel management
Computer technicians - Selection and appointment |
Soggetto non controllato |
Cybersecurity
Human resources Information technology Data breach Hiring C-Suite Onboarding Interview Career Behavioral interview Budget Budget process Security budget IT Talen acquisition |
ISBN | 1-63742-168-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Identifying your cybersecurity hiring need -- Chapter 2. Can -- Trust -- Will -- Chapter 3. Finding the right candidates -- Chapter 4. The big mistake (and how to avoid it) -- Chapter 5. Hiring the right cybersecurity role behaviors -- Chapter 6. The interview -- Chapter 7. Onboarding cybersecurity hires (and building cybersecurity Into onboarding) -- Chapter 8. Concluding thoughts and tips for candidates -- Appendix A. Model behavioral question sets -- Appendix B. Additional behavioral question sets. |
Record Nr. | UNINA-9910795545003321 |
Garber Leeza | ||
New York : , : Business Expert Press, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity |
Autore | Garber Leeza |
Edizione | [First edition.] |
Pubbl/distr/stampa | New York : , : Business Expert Press, , 2021 |
Descrizione fisica | 1 online resource (224 pages) |
Disciplina | 005.80683 |
Altri autori (Persone) | OlsonScott |
Collana | Business law and corporate risk |
Soggetto topico |
Computer security - Personnel management
Computer technicians - Selection and appointment |
Soggetto non controllato |
Cybersecurity
Human resources Information technology Data breach Hiring C-Suite Onboarding Interview Career Behavioral interview Budget Budget process Security budget IT Talen acquisition |
ISBN | 1-63742-168-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Identifying your cybersecurity hiring need -- Chapter 2. Can -- Trust -- Will -- Chapter 3. Finding the right candidates -- Chapter 4. The big mistake (and how to avoid it) -- Chapter 5. Hiring the right cybersecurity role behaviors -- Chapter 6. The interview -- Chapter 7. Onboarding cybersecurity hires (and building cybersecurity Into onboarding) -- Chapter 8. Concluding thoughts and tips for candidates -- Appendix A. Model behavioral question sets -- Appendix B. Additional behavioral question sets. |
Record Nr. | UNINA-9910813026903321 |
Garber Leeza | ||
New York : , : Business Expert Press, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Corporate espionage, geopolitics, and diplomacy issues in international business / / Bryan Christiansen and Fatmanur Kasarcı, editors |
Pubbl/distr/stampa | Hershey, Pennsylvania : , : IGI Global, , 2017 |
Descrizione fisica | PDFs (373 pages) : illustrations |
Disciplina | 658.4/72 |
Collana | Advances in Finance, Accounting, and Economics |
Soggetto topico |
International business enterprises - Management
Business intelligence Geopolitics - Economic aspects International economic relations International trade |
Soggetto non controllato |
Active pacifism
Branding Cybersecurity Disruptive technologies Entrepreneurship Intellectual capital |
ISBN |
9781522510321
9781522510314 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Blurred lines between competitive intelligence and corporate espionage / Harish C. Chandan -- Abenomics and active pacifism: how Abe's age influenced the international business / Vittorio D'Aleo [and 5 others] -- Nationalism and patriotism in international business / Duane Windsor -- Cybersecurity concerns in international business / Joel F. Williquette -- How globalization sparked entrepreneurship in the developing world: the impact of formal economic and political linkages / Luis Alfonso Dau [and 3 others] -- The importance of entrepreneurship in global business / Kijpokin Kasemsap -- Problem solving using soft-math (SM) methodology / Allen McKenna, Georges Baume -- The secret to the success of K-pop: the benefits of well-balanced copyrights / Jimmyn Parc, Patrick Messerlin, Hwy-Chang Moon -- Competition for influence: the impact of the nuclear issue on international business in North Korea / Stephen Ranger -- Towards black box forensic cybercrime investigation model (BBFCIM): beyond the rule of thumb / Oyewole Simon Oginni -- Intellectual capital and business performance of pharmaceutical firms in Kenya / James Mark Ngari -- The geopolitics of immigrant labour: a climate of fear / Elizabeth Mary Christopher -- Sustainable supply chains and international soft landings: a case of wetland entrepreneurship / Ye-Sho Chen -- Are shocks to energy consumption per capita in Turkey permanent or temporary? / Yasar Serhat Yasgül, Burak Güris, Burcu Yavuz Tiftikçigil --
Competitiveness of Turkey in the sectoral transformation process: a comparative analysis with the BRIC countries / Sema Ay, Hilal Yildirir Keser -- Securitization and the economy of risks: decision-making in the Eurasian Union / Oxana Karnaukhova -- Characteristics and activities of the US Secret Service / Agnieszka Piekarz. |
Record Nr. | UNINA-9910149369203321 |
Hershey, Pennsylvania : , : IGI Global, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security and Critical Infrastructures 2nd Volume |
Autore | Maglaras Leandros |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (326 p.) |
Soggetto topico |
Technology: general issues
History of engineering & technology |
Soggetto non controllato |
Cybersecurity
critical Infrastructures privacy preservation |
ISBN | 3-0365-5662-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910637791403321 |
Maglaras Leandros | ||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller |
Autore | Möller, Dietmar P. F. |
Pubbl/distr/stampa | Cham, : Springer, 2020 |
Descrizione fisica | xix, 114 p. : ill. ; 24 cm |
Soggetto topico |
68-XX - Computer science [MSC 2020]
94-XX - Information and communication theory, circuits [MSC 2020] |
Soggetto non controllato |
Anomaly Detection
Attach Models and Scenarios Cyber Threat Intelligence Cybersecurity Cybersecurity Leadership Cybersecurity Ontology Deep Learning Digital Transformation Intrusion Detection and Intrusion Prevention Machine learning |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNICAMPANIA-VAN0248955 |
Möller, Dietmar P. F. | ||
Cham, : Springer, 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller |
Autore | Möller, Dietmar P. F. |
Pubbl/distr/stampa | Cham, : Springer, 2020 |
Descrizione fisica | xix, 114 p. : ill. ; 24 cm |
Soggetto topico |
68-XX - Computer science [MSC 2020]
94-XX - Information and communication theory, circuits [MSC 2020] |
Soggetto non controllato |
Anomaly Detection
Attach Models and Scenarios Cyber Threat Intelligence Cybersecurity Cybersecurity Leadership Cybersecurity Ontology Deep Learning Digital Transformation Intrusion Detection and Intrusion Prevention Machine learning |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNICAMPANIA-VAN00248955 |
Möller, Dietmar P. F. | ||
Cham, : Springer, 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu |
Autore | Pawlick, Jeffrey |
Pubbl/distr/stampa | Cham, : Birkhäuser, : Springer, 2021 |
Descrizione fisica | xiii, 190 p. : ill. ; 24 cm |
Altri autori (Persone) | Zhu, Quanyan |
Soggetto topico |
91-XX - Game theory, economics, finance, and other social and behavioral sciences [MSC 2020]
91A80 - Applications of game theory [MSC 2020] 91A10 - Noncooperative games [MSC 2020] 68M25 - Computer security [MSC 2020] 91A18 - Games in extensive form [MSC 2020] 91A65 - Hierarchical games (including Stackelberg games) [MSC 2020] 91A27 - Games with incomplete information, Bayesian games [MSC 2020] 91A28 - Signaling and communication in game theory [MSC 2020] 91A16 - Mean field games (aspects of game theory) [MSC 2020] |
Soggetto non controllato |
Attacker engagement cybersecurity
Bayesian games Cyber deception Cybersecurity Defensive deception cyber Dos attack cybersecurity Game Theory Games of incomplete information Honey-X cybersecurity Internet of Things Large population games Nash games Obfuscation cybersecurity Stackelberg games Strategic trust cybersecurity Zero-sum matrix games |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNICAMPANIA-VAN0274386 |
Pawlick, Jeffrey | ||
Cham, : Birkhäuser, : Springer, 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu |
Autore | Pawlick, Jeffrey |
Pubbl/distr/stampa | Cham, : Birkhäuser, : Springer, 2021 |
Descrizione fisica | xiii, 190 p. : ill. ; 24 cm |
Altri autori (Persone) | Zhu, Quanyan |
Soggetto topico |
68M25 - Computer security [MSC 2020]
91-XX - Game theory, economics, finance, and other social and behavioral sciences [MSC 2020] 91A10 - Noncooperative games [MSC 2020] 91A16 - Mean field games (aspects of game theory) [MSC 2020] 91A18 - Games in extensive form [MSC 2020] 91A27 - Games with incomplete information, Bayesian games [MSC 2020] 91A28 - Signaling and communication in game theory [MSC 2020] 91A65 - Hierarchical games (including Stackelberg games) [MSC 2020] 91A80 - Applications of game theory [MSC 2020] |
Soggetto non controllato |
Attacker engagement cybersecurity
Bayesian games Cyber deception Cybersecurity Defensive deception cyber Dos attack cybersecurity Game Theory Games of incomplete information Honey-X cybersecurity Internet of Things Large population games Nash games Obfuscation cybersecurity Stackelberg games Strategic trust cybersecurity Zero-sum matrix games |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNICAMPANIA-VAN00274386 |
Pawlick, Jeffrey | ||
Cham, : Birkhäuser, : Springer, 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Intentional risk management through complex networks analysis / Victor Chapela ... [et al.] |
Pubbl/distr/stampa | [Cham], : Springer, 2015 |
Descrizione fisica | XV, 126 p. : ill. ; 24 cm |
Soggetto topico |
90C35 - Programming involving graphs or networks [MSC 2020]
68R10 - Graph theory (including graph drawing) in computer science [MSC 2020] 05C90 - Applications of graph theory [MSC 2020] 05C82 - Small world graphs, complex networks (graph-theoretic aspects) [MSC 2020] 91Dxx - Mathematical sociology (including anthropology) [MSC 2020] 68M11 - Internet topics [MSC 2020] 90B18 - Communication networks in operations research [MSC 2020] |
Soggetto non controllato |
Algorithm and mechanism design
Complex network theory Cybersecurity Dynamic intentional risk Network Security Static intentional risk |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNICAMPANIA-VAN0113896 |
[Cham], : Springer, 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Intentional risk management through complex networks analysis / Victor Chapela ... [et al.] |
Pubbl/distr/stampa | [Cham], : Springer, 2015 |
Descrizione fisica | XV, 126 p. : ill. ; 24 cm |
Soggetto topico |
05C82 - Small world graphs, complex networks (graph-theoretic aspects) [MSC 2020]
05C90 - Applications of graph theory [MSC 2020] 68M11 - Internet topics [MSC 2020] 68R10 - Graph theory (including graph drawing) in computer science [MSC 2020] 90B18 - Communication networks in operations research [MSC 2020] 90C35 - Programming involving graphs or networks [MSC 2020] 91Dxx - Mathematical sociology (including anthropology) [MSC 2020] |
Soggetto non controllato |
Algorithm and mechanism design
Complex network theory Cybersecurity Dynamic intentional risk Network Security Static intentional risk |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNICAMPANIA-VAN00113896 |
[Cham], : Springer, 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|