Cyber security culture : counteracting cyber threats through organizational learning and training / Peter Trim and David Upton.
Material type:
- 9781409456940 (hbk. : alk. paper)
- 1409456943 (hbk. : alk. paper)
- 9781409456957 (ebk. PDF)
- 9781409474579 (ebk. ePUB)
- 658.4/78 23
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Athi-River Campus Open Shelves | General Collection | HD30.2.T75 2013 (Browse shelf(Opens below)) | Available | BK0105305 | ||
![]() |
Athi-River Campus Open Shelves | General Collection | HD30.2.T75 2013 (Browse shelf(Opens below)) | Available | BK0105306 | ||
![]() |
Athi-River Campus Open Shelves | General Collection | HD30.2.T75 2013 (Browse shelf(Opens below)) | Available | BK0105307 | ||
![]() |
Nairobi Campus Open Shelves | General Collection | HD30.2.T75 2013 (Browse shelf(Opens below)) | Available | BK0105308 | ||
![]() |
Nairobi Campus Open Shelves | General Collection | HD30.2.T75 2013 (Browse shelf(Opens below)) | Available | BK0105309 |
Includes bibliographical references and index.
Cyber Security Culture is a research-based book focusing on cyber security and countermeasures against orchestrated cyber attacks. Reinforced with insights from experts who do not normally release data and information into the public arena, the book enables managers within organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that will ultimately protect an organization from attacks. Peter trim and David Upton believe that the speed and complexity of cyber attacks demand a different approach to security management, including scenario-based planning and training, to supplement security polices and technical protection systems. The authors provide in-depth cover of issues such as how organizational learning can be used to produce cultural change that addresses the behavior of individuals as well as machines. The book provides information that will help managers to form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate practical interventions such as table top exercises. --from barnesandnoble.com
There are no comments on this title.