Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Security [electronic resource] : the Human Factor.

By: Kearney, Paul.
Material type: TextTextPublisher: Ely : IT Governance Pub., 2010Description: 1 online resource (60 p.).ISBN: 9781849280648 (electronic bk.); 1849280649 (electronic bk.).Subject(s): Business enterprises -- Computer networks -- Security measures | Information technology -- Security measures | Information technology -- Management | Computer science | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- GeneralGenre/Form: Electronic books.Additional physical formats: Print version:: Security : The Human FactorDDC classification: 005.8019 Online resources: EBSCOhost
Contents:
Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources.
Summary: This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Foreword; Preface; About the Author; Contents; Introduction; Chapter 1: Carelessness; Chapter 2: Accidental Disclosure; Chapter 3: People are Intelligent; Chapter 4: An Aside: Password Policies; Chapter 5: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7: Why Raise Awareness?; Chapter 8: Beyond Awareness; Chapter 9: The Extended Enterprise; Chapter 10: Process Design; Chapter 11: Usability; Chapter 12: And Finally ... ; ITG Resources.

This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter