0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Information Security Awareness (Hardcover): Timothy P. Layton Sr. Information Security Awareness (Hardcover)
Timothy P. Layton Sr.
R1,057 Discovery Miles 10 570 Ships in 18 - 22 working days

Information Security Awareness: The Psychology Behind the Technology is a book written for information security managers and organizational leaders. This text focuses on the behaviors of information systems users in an organizational setting and why this is critical to successful information security awareness programs. The ultimate goal of all information security awareness programs from a business perspective is to change the behavior of users, resulting in fewer user-related errors that cause costly and destructive security incidents. Rather than taking a traditional technology-oriented approach the author has taken a unique method by exploring and discussing six key psychological aspects of people's behavior. Specifically the author discusses how these phenomena relate to, and impact, an information security program. The six behavioral-oriented phenomena reviewed in this book are: motivation, attitude, beliefs, personality, morals, and ethics. These six phenomena are the basis for a new psychological-based framework that the author presents in this book known as POSTTM. POSTTM is an acronym for "The Psychology of Security and Technology." Many organizations take the approach of "informing" their user community of their security policies, guidelines, and procedures. This would be described as a descriptive approach, meaning the users are told they must comply because management requires them to. Recent research in organizational psychology and information security awareness postulates that this approach is flawed. The descriptive-based approach does nothing to help the users internalize or justify the organizations requirements, therefore their attitudes and motivations will belacking and ultimately produce undesirable results. A new prescriptive-based approach to information security awareness is presented in the book which leverages the POSTTM constructs. This new approach focuses on users internalizing information security messages and policies.

Information Security - Design, Implementation, Measurement, and Compliance (Hardcover): Timothy P Layton Information Security - Design, Implementation, Measurement, and Compliance (Hardcover)
Timothy P Layton
R3,938 Discovery Miles 39 380 Ships in 10 - 15 working days

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Radio Wave Propagation in Vehicular…
Leyre Azpilicueta, Cesar Vargas-Rosales, … Hardcover R3,326 R3,004 Discovery Miles 30 040
Wireless Mesh Networks for IoT and Smart…
Luca Davoli, Gianluigi Ferrari Hardcover R3,104 R2,806 Discovery Miles 28 060
Ultra-Low Power Wireless Technologies…
Brian Otis, Jan Rabaey Hardcover R2,757 Discovery Miles 27 570
Energy Harvesting in Wireless Sensor…
Faisal Karim Shaikh, Sherali Zeadally Hardcover R3,214 R2,904 Discovery Miles 29 040
Employing Recent Technologies for…
Vasaki Ponnusamy, Khalid Rafique, … Hardcover R5,363 Discovery Miles 53 630
Vital Contact - Downclassing Journeys in…
Patrick Chura Hardcover R4,641 Discovery Miles 46 410
Antenna Arrays - A Computational…
RL Haupt Hardcover R3,607 Discovery Miles 36 070
Algorithms, Methods, and Applications in…
Agustinus Borgy Waluyo Hardcover R5,123 Discovery Miles 51 230
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans Hardcover R1,930 Discovery Miles 19 300
Business Data Communications and…
Hardcover R2,635 Discovery Miles 26 350

 

Partners