|
|
|
|
LEADER |
02772nam a22003975i 4500 |
001 |
978-1-4842-2835-7 |
003 |
DE-He213 |
005 |
20170630022838.0 |
007 |
cr nn 008mamaa |
008 |
170614s2017 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484228357
|9 978-1-4842-2835-7
|
024 |
7 |
|
|a 10.1007/978-1-4842-2835-7
|2 doi
|
040 |
|
|
|d GrThAP
|
100 |
1 |
|
|a Schroeder, Jordan.
|e author.
|
245 |
1 |
0 |
|a Advanced Persistent Training
|h [electronic resource] :
|b Take Your Security Awareness Program to the Next Level /
|c by Jordan Schroeder.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2017.
|
300 |
|
|
|a XIX, 92 p. 8 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 01 : Challenges Faced by Organizations -- 02 : Active Feedback -- 03 : Behavioral Modification -- 04 : Persistent Training -- 05 : Metrics and Measures -- 06 : Pro Tips -- 07 : Take Your Program to the Next Level -- 08 : Security Culture -- Appendix A : Lessons from the Masters.
|
520 |
|
|
|a Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. .
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Computer Applications.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484228340
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4842-2835-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|