Information security culture a human firewall approach
In order to ease on such establishment, his book introduces several principles, in which can help to guide employees on their responsibilities and roles. These principle can also be used as a human firewall to combat any threats caused by insiders. In short, implementation of such principles can hel...
Saved in:
| Main Author: | Omar Zakaria |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Saarbrücken, Deutschland/Germany
LAP Lambert Academic Pub.
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Information systems security facing the information society of the 21st century
Published: (1996)
Published: (1996)
Information warfare corporate attack and defence in a digital world
by: Hutchinson, Bill
Published: (2001)
by: Hutchinson, Bill
Published: (2001)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Computer and information security
Published: (2016)
Published: (2016)
Information security architecture an integrated approach to security in the organization
by: Tudor, Jan Killmeyer
Published: (2006)
by: Tudor, Jan Killmeyer
Published: (2006)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security a strategic approach
by: LeVeque
Published: (2006)
by: LeVeque
Published: (2006)
Managing information security
Published: (2014)
Published: (2014)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Pengenalan kepada keselamatan komputer
by: Omar Zakaria
Published: (2002)
by: Omar Zakaria
Published: (2002)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Developments in information security and cybernetic wars
Published: (2019)
Published: (2019)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Information Security Risk Management for Iso27001/Iso 27002
by: Calder, Alan
Published: (2019)
by: Calder, Alan
Published: (2019)
Spillage of information threats to Malaysia security
by: Mohd. Zaily Hatta Mohd. Jelani
by: Mohd. Zaily Hatta Mohd. Jelani
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
The basics of information security understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2011)
by: Andress, Jason
Published: (2011)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Security technologies for the world wide web
by: OppligerlhRolf
by: OppligerlhRolf
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Power and security in information age investigating the role of the state in cyberspace
Published: (2007)
Published: (2007)
Information security and technology
by: Ponnappa, B.M
Published: (2004)
by: Ponnappa, B.M
Published: (2004)
Information security and technology
by: Ponnappa, B.M
Published: (2004)
by: Ponnappa, B.M
Published: (2004)
Hands-on cybersecurity for architects plan and design robust security architectures
by: Rerup, Neil, et al.
Published: (2018)
by: Rerup, Neil, et al.
Published: (2018)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Information technology - Security techniques - Information security management systems - Requirements (First revision )(ISO/IEC 27001:2013,IDT) (Published by Standard Malaysia in 2014) / SIRIM Berhad
Published: (2014)
Published: (2014)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Security awareness applying practical security in your world
by: Ciampa
Published: (2004)
by: Ciampa
Published: (2004)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Similar Items
-
Management of information security
by: Whitman
Published: (2004) -
Information systems security facing the information society of the 21st century
Published: (1996) -
Information warfare corporate attack and defence in a digital world
by: Hutchinson, Bill
Published: (2001) -
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013) -
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)


