Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing the Human Factor in Information Security: How to win over staff and influence business managers

Buy
"...an engaging read." (Information Age, May 2009) "I found the book enjoyable and easy to read. It is very informative, and gives good references" (Infosecurity, June 2009)

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals.

“Computers do not commit crimes. People do.”

The biggest threat to information security is the “human factor”, the influence of people. Even the best people will make mistakes, cause breaches and create security weaknesses that enable criminals to steal, corrupt or manipulate systems and data. The explosion in social networking and mobile computing is intensifying this problem.

For the first time, this book brings together theories and methods which will help you to change and harness people’s security behaviour. It will help you to:

  • Understand and manage major crises and risk
  • Appreciate the nature of the insider threat
  • Navigate organisation culture and politics
  • Build better awareness programmes
  • Transform user attitudes and behaviour
  • Gain Executive Board buy-in
  • Design management systems that really work
  • Harness the power of your organisation

Based on the author’s own personal experience of working with large, complex organisations, such as Shell and Royal Mail, this book is written by an information security insider and makes essential reading for all information security professionals.

“We live in am age where social networks, collaborative working and community development are global and commonplace, redefining the role of information security. David takes a dry-as-dust elephant of a subject and expertly serves it up in edible, even tasty, morsels.” JP Rangaswami, Managing Director of BT Design.

“A highly entertaining read that will undoubtedly become essential reading for all security professionals.” Professor Fred Piper

“I’m really interested in reading this book and, frankly, once it’s published, I’ll be one of the first to buy it.” Dr. Eugene Schultz, High Tower Software

(HTML tags aren't allowed.)

Window Functions and Their Applications in Signal Processing
Window Functions and Their Applications in Signal Processing

Window functions—otherwise known as weighting functions, tapering functions, or apodization functions—are mathematical functions that are zero-valued outside the chosen interval. They are well established as a vital part of digital signal processing. Window Functions and their Applications in Signal Processing presents an...

Managing Worldwide Operations and Communications With Information Technology
Managing Worldwide Operations and Communications With Information Technology
A data warehouse consists of a set of materialized views that contain derived data from several data sources. Materialized views are beneficial because they allow efficient retrieval of summary data. However, materialized views need to be refreshed periodically in order to avoid staleness. During a materialized view refresh only changes to the base...
Thomas Aquinas on the Passions: A Study of Summa Theologiae
Thomas Aquinas on the Passions: A Study of Summa Theologiae
The Summa Theologiae is Thomas Aquinas' undisputed masterwork, and it includes his thoughts on the elemental forces in human life. Feelings such as love, hatred, pleasure, pain, hope and despair were described by Aquinas as 'passions', representing the different ways in which happiness could be affected. But what causes the passions? What impact do...

Understanding and Writing Compilers: A Do It Yourself Guide (Macmillan Computer Science Series)
Understanding and Writing Compilers: A Do It Yourself Guide (Macmillan Computer Science Series)
In the past compiler writers and designers seemed to form an elite group within computing science, set apart by their esoteric knowledge and their ability to produce large, important system programs which really worked. The admiration of the computing public, whether it was once deserved or not, is no longer merited now that the principles of...
Space-Efficient Data Structures, Streams, and Algorithms: Papers in Honor of J. Ian Munro, on the Occasion of His 66th Birthday
Space-Efficient Data Structures, Streams, and Algorithms: Papers in Honor of J. Ian Munro, on the Occasion of His 66th Birthday

This Festschrift volume, published in honour of J. Ian Munro, contains contributions written by some of his colleagues, former students, and friends. In celebration of his 66th birthday the colloquium "Conference on Space Efficient Data Structures, Streams and Algorithms" was held in Waterloo, ON, Canada, during August 15-16, 2013....

Grid Computing: Making The Global Infrastructure a Reality
Grid Computing: Making The Global Infrastructure a Reality
"A few years ago ‘The Grid’ emerged as one of the most important new developments in building the infrastructure for computational science in the 21st century. The tremendous enthusiasm for grid computing has led to an extremely rapid growth of our knowledge about how to make grids a reality. This is a timely book with...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy