Cyber security culture counteracting cyber threats through organizational learning and training /œcby Peter Trim and David Upton

Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learni...

Full description

Saved in:
Bibliographic Details
Main Author: Trim, Peter R. J. (Author)
Other Authors: Upton, David 1949-
Format: Book
Language:English
Published: [Place of publication is not identified] Gower Publishing 2013
Series:Gower applied business research
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :HD 30.2 .T75 2013

MARC

LEADER 00000nam a2200000 c 4500
001 50785
003 MY-KLNDU
005 20241219013807.0
008 221104 20132013xxka bi 001 0 eng d
020 |a 9781409456940 (hbk) 
039 9 |a 202211041213  |b VLOAD  |c 201901141122  |d faezah  |y 201809201143  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a HD 30.2  |b .T75 2013 
100 1 |a Trim, Peter R. J.  |e author 
245 1 0 |a Cyber security culture  |b counteracting cyber threats through organizational learning and training /œcby Peter Trim and David Upton 
264 1 |a [Place of publication is not identified]  |b Gower Publishing  |c 2013 
264 4 |c © 2013 
300 |a xx, 211 pages  |b illustrations  |c 25 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a Gower applied business research. 
504 |a Includes bibliographical references and index 
520 |a Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learning and training can be utilized to develop a culture that protects an organization from attacks. The authors provide information to help managers form policy and procedures, to undertake scenario-based planning and arrange appropriate training interventions, such as table top exercises 
592 |a 00012905/18  |b 26/11/2018  |c RM 477.18  |h Areesh 
650 0 |a Information technology  |x Security measures 
650 0 |a Computer security 
650 0 |a Computer crimes  |x Prevention 
700 1 |a Upton, David  |d 1949- 
830 0 |a Gower applied business research 
999 |a vtls000061541  |c 50785  |d 50785