Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers in industry and government to understand how organizational learni...
Saved in:
| Main Author: | Trim, Peter R. J. (Author) |
|---|---|
| Other Authors: | Upton, David 1949- |
| Format: | Book |
| Language: | English |
| Published: |
[Place of publication is not identified]
Gower Publishing
2013
|
| Series: | Gower applied business research
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | HD 30.2 .T75 2013 |
Similar Items
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
by: Winterfeld, Steve
Published: (2013)
by: Winterfeld, Steve
Published: (2013)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Deterrence in the cyberspace the quest for red-line against cyber threats
by: Chan, Yongxue Duncan
by: Chan, Yongxue Duncan
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Cyber reconnaissance, surveillance, and defense
by: Shimonski, Robert
Published: (2014)
by: Shimonski, Robert
Published: (2014)
Cyber warfare and cyber terrorism
Published: (2008)
Published: (2008)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Emerging trends in ICT security
Published: (2014)
Published: (2014)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018)
Published: (2018)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Cyber security of industrial control systems in the future internet environment
Published: (2020)
Published: (2020)
Digital forensics and incident response incident response tools and techniques for effective cyber threat response
by: Johansen, Gerard
Published: (2022)
by: Johansen, Gerard
Published: (2022)
Similar Items
-
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018) -
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017) -
Cyber security practitioner's guide
Published: (2020) -
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)


