Cybersecurity education for awareness and compliance:
"This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consi...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagwörter: | |
Links: | https://doi.org/10.4018/978-1-5225-7847-5 https://doi.org/10.4018/978-1-5225-7847-5 https://doi.org/10.4018/978-1-5225-7847-5 https://doi.org/10.4018/978-1-5225-7847-5 https://doi.org/10.4018/978-1-5225-7847-5 https://doi.org/10.4018/978-1-5225-7847-5 https://doi.org/10.4018/978-1-5225-7847-5 |
Zusammenfassung: | "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"... |
Beschreibung: | Includes bibliographical references |
Umfang: | 1 Online-Ressource |
ISBN: | 9781522578482 |
DOI: | 10.4018/978-1-5225-7847-5 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045539416 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 190402s2019 xxu o|||| 00||| eng d | ||
020 | |a 9781522578482 |9 978-1-5225-7848-2 | ||
035 | |a (OCoLC)1091670270 | ||
035 | |a (DE-599)BVBBV045539416 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
050 | 0 | |a HD30.38 | |
082 | 0 | |a 658.3/124 |2 23 | |
245 | 1 | 0 | |a Cybersecurity education for awareness and compliance |c Ismini Vasileiou, Steven Furnell |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"... | ||
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Employees |x Training of | |
650 | 4 | |a Employee rules | |
700 | 1 | |a Vasileiou, Ismini |d 1980- |4 edt | |
700 | 1 | |a Furnell, Steven |d 1970- |0 (DE-588)1038562899 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, h/c |z 978-1-5225-7847-5 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-7847-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
912 | |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030923368 | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-706 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-7847-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2411472 |
---|---|
_version_ | 1821935958148251648 |
any_adam_object | |
author2 | Vasileiou, Ismini 1980- Furnell, Steven 1970- |
author2_role | edt edt |
author2_variant | i v iv s f sf |
author_GND | (DE-588)1038562899 |
author_facet | Vasileiou, Ismini 1980- Furnell, Steven 1970- |
building | Verbundindex |
bvnumber | BV045539416 |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.38 |
callnumber-search | HD30.38 |
callnumber-sort | HD 230.38 |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1091670270 (DE-599)BVBBV045539416 |
dewey-full | 658.3/124 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.3/124 |
dewey-search | 658.3/124 |
dewey-sort | 3658.3 3124 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-5225-7847-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02413nam a2200493 c 4500</leader><controlfield tag="001">BV045539416</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190402s2019 xxu o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522578482</subfield><subfield code="9">978-1-5225-7848-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1091670270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045539416</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD30.38</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.3/124</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity education for awareness and compliance</subfield><subfield code="c">Ismini Vasileiou, Steven Furnell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employees</subfield><subfield code="x">Training of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee rules</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vasileiou, Ismini</subfield><subfield code="d">1980-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)1038562899</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, h/c</subfield><subfield code="z">978-1-5225-7847-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030923368</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-7847-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045539416 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:29:46Z |
institution | BVB |
isbn | 9781522578482 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030923368 |
oclc_num | 1091670270 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spellingShingle | Cybersecurity education for awareness and compliance Business enterprises Computer networks Security measures Information technology Security measures Employees Training of Employee rules |
title | Cybersecurity education for awareness and compliance |
title_auth | Cybersecurity education for awareness and compliance |
title_exact_search | Cybersecurity education for awareness and compliance |
title_full | Cybersecurity education for awareness and compliance Ismini Vasileiou, Steven Furnell |
title_fullStr | Cybersecurity education for awareness and compliance Ismini Vasileiou, Steven Furnell |
title_full_unstemmed | Cybersecurity education for awareness and compliance Ismini Vasileiou, Steven Furnell |
title_short | Cybersecurity education for awareness and compliance |
title_sort | cybersecurity education for awareness and compliance |
topic | Business enterprises Computer networks Security measures Information technology Security measures Employees Training of Employee rules |
topic_facet | Business enterprises Computer networks Security measures Information technology Security measures Employees Training of Employee rules |
url | https://doi.org/10.4018/978-1-5225-7847-5 |
work_keys_str_mv | AT vasileiouismini cybersecurityeducationforawarenessandcompliance AT furnellsteven cybersecurityeducationforawarenessandcompliance |