top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity
Autore Garber Leeza
Edizione [First edition.]
Pubbl/distr/stampa New York : , : Business Expert Press, , 2021
Descrizione fisica 1 online resource (224 pages)
Disciplina 005.80683
Altri autori (Persone) OlsonScott
Collana Business law and corporate risk
Soggetto topico Computer security - Personnel management
Computer technicians - Selection and appointment
Soggetto non controllato Cybersecurity
Human resources
Information technology
Data breach
Hiring
C-Suite
Onboarding
Interview
Career
Behavioral interview
Budget
Budget process
Security budget
IT
Talen acquisition
ISBN 1-63742-168-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Identifying your cybersecurity hiring need -- Chapter 2. Can -- Trust -- Will -- Chapter 3. Finding the right candidates -- Chapter 4. The big mistake (and how to avoid it) -- Chapter 5. Hiring the right cybersecurity role behaviors -- Chapter 6. The interview -- Chapter 7. Onboarding cybersecurity hires (and building cybersecurity Into onboarding) -- Chapter 8. Concluding thoughts and tips for candidates -- Appendix A. Model behavioral question sets -- Appendix B. Additional behavioral question sets.
Record Nr. UNINA-9910795545003321
Garber Leeza  
New York : , : Business Expert Press, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity
Can. Trust. Will : Hiring for the Human Element in the New Age of Cybersecurity
Autore Garber Leeza
Edizione [First edition.]
Pubbl/distr/stampa New York : , : Business Expert Press, , 2021
Descrizione fisica 1 online resource (224 pages)
Disciplina 005.80683
Altri autori (Persone) OlsonScott
Collana Business law and corporate risk
Soggetto topico Computer security - Personnel management
Computer technicians - Selection and appointment
Soggetto non controllato Cybersecurity
Human resources
Information technology
Data breach
Hiring
C-Suite
Onboarding
Interview
Career
Behavioral interview
Budget
Budget process
Security budget
IT
Talen acquisition
ISBN 1-63742-168-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Identifying your cybersecurity hiring need -- Chapter 2. Can -- Trust -- Will -- Chapter 3. Finding the right candidates -- Chapter 4. The big mistake (and how to avoid it) -- Chapter 5. Hiring the right cybersecurity role behaviors -- Chapter 6. The interview -- Chapter 7. Onboarding cybersecurity hires (and building cybersecurity Into onboarding) -- Chapter 8. Concluding thoughts and tips for candidates -- Appendix A. Model behavioral question sets -- Appendix B. Additional behavioral question sets.
Record Nr. UNINA-9910813026903321
Garber Leeza  
New York : , : Business Expert Press, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Corporate espionage, geopolitics, and diplomacy issues in international business / / Bryan Christiansen and Fatmanur Kasarcı, editors
Corporate espionage, geopolitics, and diplomacy issues in international business / / Bryan Christiansen and Fatmanur Kasarcı, editors
Pubbl/distr/stampa Hershey, Pennsylvania : , : IGI Global, , 2017
Descrizione fisica PDFs (373 pages) : illustrations
Disciplina 658.4/72
Collana Advances in Finance, Accounting, and Economics
Soggetto topico International business enterprises - Management
Business intelligence
Geopolitics - Economic aspects
International economic relations
International trade
Soggetto non controllato Active pacifism
Branding
Cybersecurity
Disruptive technologies
Entrepreneurship
Intellectual capital
ISBN 9781522510321
9781522510314
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blurred lines between competitive intelligence and corporate espionage / Harish C. Chandan -- Abenomics and active pacifism: how Abe's age influenced the international business / Vittorio D'Aleo [and 5 others] -- Nationalism and patriotism in international business / Duane Windsor -- Cybersecurity concerns in international business / Joel F. Williquette -- How globalization sparked entrepreneurship in the developing world: the impact of formal economic and political linkages / Luis Alfonso Dau [and 3 others] -- The importance of entrepreneurship in global business / Kijpokin Kasemsap -- Problem solving using soft-math (SM) methodology / Allen McKenna, Georges Baume -- The secret to the success of K-pop: the benefits of well-balanced copyrights / Jimmyn Parc, Patrick Messerlin, Hwy-Chang Moon -- Competition for influence: the impact of the nuclear issue on international business in North Korea / Stephen Ranger -- Towards black box forensic cybercrime investigation model (BBFCIM): beyond the rule of thumb / Oyewole Simon Oginni -- Intellectual capital and business performance of pharmaceutical firms in Kenya / James Mark Ngari -- The geopolitics of immigrant labour: a climate of fear / Elizabeth Mary Christopher -- Sustainable supply chains and international soft landings: a case of wetland entrepreneurship / Ye-Sho Chen -- Are shocks to energy consumption per capita in Turkey permanent or temporary? / Yasar Serhat Yasgül, Burak Güris, Burcu Yavuz Tiftikçigil --
Competitiveness of Turkey in the sectoral transformation process: a comparative analysis with the BRIC countries / Sema Ay, Hilal Yildirir Keser -- Securitization and the economy of risks: decision-making in the Eurasian Union / Oxana Karnaukhova -- Characteristics and activities of the US Secret Service / Agnieszka Piekarz.
Record Nr. UNINA-9910149369203321
Hershey, Pennsylvania : , : IGI Global, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security and Critical Infrastructures 2nd Volume
Cyber Security and Critical Infrastructures 2nd Volume
Autore Maglaras Leandros
Pubbl/distr/stampa Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Descrizione fisica 1 electronic resource (326 p.)
Soggetto topico Technology: general issues
History of engineering & technology
Soggetto non controllato Cybersecurity
critical Infrastructures
privacy preservation
ISBN 3-0365-5662-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910637791403321
Maglaras Leandros  
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller
Autore Möller, Dietmar P. F.
Pubbl/distr/stampa Cham, : Springer, 2020
Descrizione fisica xix, 114 p. : ill. ; 24 cm
Soggetto topico 68-XX - Computer science [MSC 2020]
94-XX - Information and communication theory, circuits [MSC 2020]
Soggetto non controllato Anomaly Detection
Attach Models and Scenarios
Cyber Threat Intelligence
Cybersecurity
Cybersecurity Leadership
Cybersecurity Ontology
Deep Learning
Digital Transformation
Intrusion Detection and Intrusion Prevention
Machine learning
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNICAMPANIA-VAN0248955
Möller, Dietmar P. F.  
Cham, : Springer, 2020
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller
Cybersecurity in Digital Transformation : Scope and Applications / Dietmar P.F. Möller
Autore Möller, Dietmar P. F.
Pubbl/distr/stampa Cham, : Springer, 2020
Descrizione fisica xix, 114 p. : ill. ; 24 cm
Soggetto topico 68-XX - Computer science [MSC 2020]
94-XX - Information and communication theory, circuits [MSC 2020]
Soggetto non controllato Anomaly Detection
Attach Models and Scenarios
Cyber Threat Intelligence
Cybersecurity
Cybersecurity Leadership
Cybersecurity Ontology
Deep Learning
Digital Transformation
Intrusion Detection and Intrusion Prevention
Machine learning
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNICAMPANIA-VAN00248955
Möller, Dietmar P. F.  
Cham, : Springer, 2020
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu
Autore Pawlick, Jeffrey
Pubbl/distr/stampa Cham, : Birkhäuser, : Springer, 2021
Descrizione fisica xiii, 190 p. : ill. ; 24 cm
Altri autori (Persone) Zhu, Quanyan
Soggetto topico 91-XX - Game theory, economics, finance, and other social and behavioral sciences [MSC 2020]
91A80 - Applications of game theory [MSC 2020]
91A10 - Noncooperative games [MSC 2020]
68M25 - Computer security [MSC 2020]
91A18 - Games in extensive form [MSC 2020]
91A65 - Hierarchical games (including Stackelberg games) [MSC 2020]
91A27 - Games with incomplete information, Bayesian games [MSC 2020]
91A28 - Signaling and communication in game theory [MSC 2020]
91A16 - Mean field games (aspects of game theory) [MSC 2020]
Soggetto non controllato Attacker engagement cybersecurity
Bayesian games
Cyber deception
Cybersecurity
Defensive deception cyber
Dos attack cybersecurity
Game Theory
Games of incomplete information
Honey-X cybersecurity
Internet of Things
Large population games
Nash games
Obfuscation cybersecurity
Stackelberg games
Strategic trust cybersecurity
Zero-sum matrix games
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNICAMPANIA-VAN0274386
Pawlick, Jeffrey  
Cham, : Birkhäuser, : Springer, 2021
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu
Game Theory for Cyber Deception : From Theory to Applications / Jeffrey Pawlick, Quanyan Zhu
Autore Pawlick, Jeffrey
Pubbl/distr/stampa Cham, : Birkhäuser, : Springer, 2021
Descrizione fisica xiii, 190 p. : ill. ; 24 cm
Altri autori (Persone) Zhu, Quanyan
Soggetto topico 68M25 - Computer security [MSC 2020]
91-XX - Game theory, economics, finance, and other social and behavioral sciences [MSC 2020]
91A10 - Noncooperative games [MSC 2020]
91A16 - Mean field games (aspects of game theory) [MSC 2020]
91A18 - Games in extensive form [MSC 2020]
91A27 - Games with incomplete information, Bayesian games [MSC 2020]
91A28 - Signaling and communication in game theory [MSC 2020]
91A65 - Hierarchical games (including Stackelberg games) [MSC 2020]
91A80 - Applications of game theory [MSC 2020]
Soggetto non controllato Attacker engagement cybersecurity
Bayesian games
Cyber deception
Cybersecurity
Defensive deception cyber
Dos attack cybersecurity
Game Theory
Games of incomplete information
Honey-X cybersecurity
Internet of Things
Large population games
Nash games
Obfuscation cybersecurity
Stackelberg games
Strategic trust cybersecurity
Zero-sum matrix games
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNICAMPANIA-VAN00274386
Pawlick, Jeffrey  
Cham, : Birkhäuser, : Springer, 2021
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Intentional risk management through complex networks analysis / Victor Chapela ... [et al.]
Intentional risk management through complex networks analysis / Victor Chapela ... [et al.]
Pubbl/distr/stampa [Cham], : Springer, 2015
Descrizione fisica XV, 126 p. : ill. ; 24 cm
Soggetto topico 90C35 - Programming involving graphs or networks [MSC 2020]
68R10 - Graph theory (including graph drawing) in computer science [MSC 2020]
05C90 - Applications of graph theory [MSC 2020]
05C82 - Small world graphs, complex networks (graph-theoretic aspects) [MSC 2020]
91Dxx - Mathematical sociology (including anthropology) [MSC 2020]
68M11 - Internet topics [MSC 2020]
90B18 - Communication networks in operations research [MSC 2020]
Soggetto non controllato Algorithm and mechanism design
Complex network theory
Cybersecurity
Dynamic intentional risk
Network Security
Static intentional risk
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNICAMPANIA-VAN0113896
[Cham], : Springer, 2015
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Intentional risk management through complex networks analysis / Victor Chapela ... [et al.]
Intentional risk management through complex networks analysis / Victor Chapela ... [et al.]
Pubbl/distr/stampa [Cham], : Springer, 2015
Descrizione fisica XV, 126 p. : ill. ; 24 cm
Soggetto topico 05C82 - Small world graphs, complex networks (graph-theoretic aspects) [MSC 2020]
05C90 - Applications of graph theory [MSC 2020]
68M11 - Internet topics [MSC 2020]
68R10 - Graph theory (including graph drawing) in computer science [MSC 2020]
90B18 - Communication networks in operations research [MSC 2020]
90C35 - Programming involving graphs or networks [MSC 2020]
91Dxx - Mathematical sociology (including anthropology) [MSC 2020]
Soggetto non controllato Algorithm and mechanism design
Complex network theory
Cybersecurity
Dynamic intentional risk
Network Security
Static intentional risk
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNICAMPANIA-VAN00113896
[Cham], : Springer, 2015
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui