Cybersecurity education for awareness and compliance
"This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consi...
Saved in:
| Other Authors: | Vasileiou, Ismini 1980 (Editor), Furnell, Steven 1970 (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
2019
|
| Series: | Advance in Information Serurity,Privacy, and Ethics (AISPE) Book Series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Hands-on cybersecurity for architects plan and design robust security architectures
by: Rerup, Neil, et al.
Published: (2018)
by: Rerup, Neil, et al.
Published: (2018)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Industrial cybersecurity efficiently secure critical infrastructure systems
by: Ackerman, Pascal
Published: (2017)
by: Ackerman, Pascal
Published: (2017)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Cybersecurity for beginners
by: Meeuwisse, Raef
Published: (2017)
by: Meeuwisse, Raef
Published: (2017)
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015)
by: Dykstra, Josiah
Published: (2015)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Hacking point of sale payment application secrets, threats, and solutions
by: Gomzin, Slava
Published: (2014)
by: Gomzin, Slava
Published: (2014)
Secrets and lies digital security in a networked world
by: Schneier, Bruce 1963-
Published: (2000)
by: Schneier, Bruce 1963-
Published: (2000)
Next generation red teaming
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Hands-on cybersecurity for finance identify vulnerabilities and secure your financial services from security breaches
by: Ozkaya, Erdal, et al.
Published: (2019)
by: Ozkaya, Erdal, et al.
Published: (2019)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Practical Industrial Internet of Things security practitioner's guide to securing connected industries
by: Bhattacharjee, Sravani
Published: (2018)
by: Bhattacharjee, Sravani
Published: (2018)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
by: Gupta, Rajneesh
Published: (2018)
by: Gupta, Rajneesh
Published: (2018)
US national cybersecurity international politics, concepts and organization
Published: (2017)
Published: (2017)
Cybersecurity Ops with bash attack, defend, and analyze from the command line
by: Troncone, Paul, et al.
Published: (2019)
by: Troncone, Paul, et al.
Published: (2019)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Cybersecurity, botnets and cyberterrorism
by: Jacobson George V.
Published: (2009)
by: Jacobson George V.
Published: (2009)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Identity and data security for web development best practices
by: LeBlanc, Jonathan, et al.
Published: (2016)
by: LeBlanc, Jonathan, et al.
Published: (2016)
Electronic commerce relationships trust by design
by: lh
by: lh
Similar Items
-
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015) -
Hands-on cybersecurity for architects plan and design robust security architectures
by: Rerup, Neil, et al.
Published: (2018) -
Cybersecurity public sector threats and responses
Published: (2012) -
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009) -
Advances in enterprise information technology security
Published: (2007)


