000 | 01463nam a22001817a 4500 | ||
---|---|---|---|
999 |
_c16314 _d16314 |
||
005 | 20200908102843.0 | ||
008 | 181126b ||||| |||| 00| 0 eng d | ||
020 | _a9781420089103 | ||
040 | _cPK-IsLIS | ||
082 |
_a658.478 _bC689 |
||
100 | _aCollette, Ron | ||
245 |
_aCISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives _c/ Ron Collette |
||
260 |
_aBoca Raton : _bCRC Press, _c2009 |
||
300 | _axxxi, 282 p. | ||
650 | _aBusiness -- Data processing -- Security measures. Computer security. Information technology -- Security measures. Data protection. BUSINESS & ECONOMICS -- Industrial Management. BUSINESS & ECONOMICS -- Management. BUSINESS & ECONOMICS -- Management Science. BUSINESS & ECONOMICS -- Organizational Behavior. | ||
942 | _cBK | ||
505 | 0 | _aChapter 1. What's Not Right; Chapter 2. True Security Model; Chapter 3. Apathy; Chapter 4. Myopia; Chapter 5. Primacy; Chapter 6. Infancy; Chapter 7. Tying It All Together; Chapter 8. Closing Thoughts; Appendix; Exercise 9: Apathy; Exercise 10: Myopia; Exercise 11: Myopia; Exercise 12: Myopia; Exercise 13: Primacy; Exercise 14: Primacy; Exercise 15: Primacy; Exercise 16: Infancy; Exercise 17: Infancy; Exercise 18: Tying It All Together; Exercise 19: Tying It All Together; Exercise 20: Tying It All Together. Exercise 21: Tying It All TogetherExercise 22: Tying It All Together; R.E.A.P. Templates: Exercises 24 to 30; References. |