Advanced persistent training: take your security awareness program to the next level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that ta...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[United States]
Apress
2017
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484228357/?ar |
Zusammenfassung: | Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco; title viewed on June 20, 2017) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781484228357 1484228359 1484228340 9781484228340 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047605979 | ||
003 | DE-627-1 | ||
005 | 20240228120306.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9781484228357 |c electronic bk. |9 978-1-4842-2835-7 | ||
020 | |a 1484228359 |c electronic bk. |9 1-4842-2835-9 | ||
020 | |a 1484228340 |9 1-4842-2834-0 | ||
020 | |a 9781484228340 |9 978-1-4842-2834-0 | ||
035 | |a (DE-627-1)047605979 | ||
035 | |a (DE-599)KEP047605979 | ||
035 | |a (ORHE)9781484228357 | ||
035 | |a (DE-627-1)047605979 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Schroeder, Jordan |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Advanced persistent training |b take your security awareness program to the next level |c Jordan Schroeder |
264 | 1 | |a [United States] |b Apress |c 2017 | |
264 | 4 | |c ©2017 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco; title viewed on June 20, 2017) | ||
520 | |a Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Security | |
650 | 4 | |a Computer Applications | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Information technology: general issues | |
650 | 4 | |a Computer security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
776 | 1 | |z 9781484228340 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484228340 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484228357/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047605979 |
---|---|
_version_ | 1821494873871613952 |
adam_text | |
any_adam_object | |
author | Schroeder, Jordan |
author_facet | Schroeder, Jordan |
author_role | aut |
author_sort | Schroeder, Jordan |
author_variant | j s js |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047605979 (DE-599)KEP047605979 (ORHE)9781484228357 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03202cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047605979</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120306.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484228357</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-2835-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484228359</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-2835-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484228340</subfield><subfield code="9">1-4842-2834-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484228340</subfield><subfield code="9">978-1-4842-2834-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047605979</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047605979</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484228357</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047605979</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schroeder, Jordan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced persistent training</subfield><subfield code="b">take your security awareness program to the next level</subfield><subfield code="c">Jordan Schroeder</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[United States]</subfield><subfield code="b">Apress</subfield><subfield code="c">2017</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco; title viewed on June 20, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology: general issues</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484228340</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484228340</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484228357/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047605979 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:18Z |
institution | BVB |
isbn | 9781484228357 1484228359 1484228340 9781484228340 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Apress |
record_format | marc |
spelling | Schroeder, Jordan VerfasserIn aut Advanced persistent training take your security awareness program to the next level Jordan Schroeder [United States] Apress 2017 ©2017 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from PDF title page (Ebsco; title viewed on June 20, 2017) Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. Computer security Computer networks Security measures Computer Science Security Computer Applications Systems and Data Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Information technology: general issues COMPUTERS ; Security ; General Computer networks ; Security measures 9781484228340 Erscheint auch als Druck-Ausgabe 9781484228340 |
spellingShingle | Schroeder, Jordan Advanced persistent training take your security awareness program to the next level Computer security Computer networks Security measures Computer Science Security Computer Applications Systems and Data Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Information technology: general issues COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Advanced persistent training take your security awareness program to the next level |
title_auth | Advanced persistent training take your security awareness program to the next level |
title_exact_search | Advanced persistent training take your security awareness program to the next level |
title_full | Advanced persistent training take your security awareness program to the next level Jordan Schroeder |
title_fullStr | Advanced persistent training take your security awareness program to the next level Jordan Schroeder |
title_full_unstemmed | Advanced persistent training take your security awareness program to the next level Jordan Schroeder |
title_short | Advanced persistent training |
title_sort | advanced persistent training take your security awareness program to the next level |
title_sub | take your security awareness program to the next level |
topic | Computer security Computer networks Security measures Computer Science Security Computer Applications Systems and Data Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Information technology: general issues COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Computer Science Security Computer Applications Systems and Data Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Information technology: general issues COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT schroederjordan advancedpersistenttrainingtakeyoursecurityawarenessprogramtothenextlevel |