Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book explains how social engineering methods are being commonly used and how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud whether they do so from a former Soviet state or from Washington, D.C.
Shows IT professionals how to overcome the social crisis that has resulted from the use of information technology. This work also shows managers how to take charge of key aspects of their IT operations and follow an ethically, and legally correct path to success. It includes instructions on how to accomplish objectives of privacy and security.
Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.