000 01463nam a22001817a 4500
999 _c16314
_d16314
005 20200908102843.0
008 181126b ||||| |||| 00| 0 eng d
020 _a9781420089103
040 _cPK-IsLIS
082 _a658.478
_bC689
100 _aCollette, Ron
245 _aCISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
_c/ Ron Collette
260 _aBoca Raton :
_bCRC Press,
_c2009
300 _axxxi, 282 p.
650 _aBusiness -- Data processing -- Security measures. Computer security. Information technology -- Security measures. Data protection. BUSINESS & ECONOMICS -- Industrial Management. BUSINESS & ECONOMICS -- Management. BUSINESS & ECONOMICS -- Management Science. BUSINESS & ECONOMICS -- Organizational Behavior.
942 _cBK
505 0 _aChapter 1. What's Not Right; Chapter 2. True Security Model; Chapter 3. Apathy; Chapter 4. Myopia; Chapter 5. Primacy; Chapter 6. Infancy; Chapter 7. Tying It All Together; Chapter 8. Closing Thoughts; Appendix; Exercise 9: Apathy; Exercise 10: Myopia; Exercise 11: Myopia; Exercise 12: Myopia; Exercise 13: Primacy; Exercise 14: Primacy; Exercise 15: Primacy; Exercise 16: Infancy; Exercise 17: Infancy; Exercise 18: Tying It All Together; Exercise 19: Tying It All Together; Exercise 20: Tying It All Together. Exercise 21: Tying It All TogetherExercise 22: Tying It All Together; R.E.A.P. Templates: Exercises 24 to 30; References.