******************************************************************************* *ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ**********ÛÛÛÛÛÛÛÛÛ********************ÛÛÛÛÛÛÛ************ *ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ********ÛÛÛÛÛÛÛÛÛÛÛÛÛÛ*****ÛÛÛÛÛÛÛ*****ÛÛÛÛÛ************** *ÛÛÛÛ***ÛÛÛÛÛÛ*ÛÛÛÛÛÛ******ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ****ÛÛÛÛÛÛÛÛÛ***ÛÛÛÛÛ****ÛÛÛÛÛÛÛÛ** *ÛÛ****ÛÛÛÛÛÛ****ÛÛÛÛ******ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ******ÛÛÛÛÛÛ****ÛÛÛÛÛ****ÛÛÛÛÛ***** ******ÛÛÛÛÛÛ******ÛÛÛ*****ÛÛÛÛÛÛÛÛ***ÛÛÛÛÛÛÛÛ****ÛÛÛÛÛÛ*****ÛÛÛÛÛ*****ÛÛÛÛÛ**** ******ÛÛÛÛÛÛ******ÛÛ*****ÛÛÛÛÛ***********ÛÛÛÛ****ÛÛÛÛÛÛ*****ÛÛÛÛÛ*****ÛÛÛÛÛÛ*** *****ÛÛÛÛÛÛÛ*************ÛÛÛ**************ÛÛÛ***ÛÛÛÛÛÛÛ*****ÛÛÛÛÛÛ****ÛÛÛÛÛÛÛ** *****ÛÛÛÛÛÛ**************ÛÛÛ******ÛÛÛÛÛ***ÛÛÛ**ÛÛÛÛÛÛÛ******ÛÛÛÛÛÛ*****ÛÛÛÛÛÛ** *****ÛÛÛÛÛÛ***ÛÛÛÛÛÛÛÛÛ**ÛÛ******ÛÛÛÛÛÛÛ**ÛÛ***ÛÛÛÛÛÛÛ*****ÛÛÛÛÛÛÛÛ****ÛÛÛÛÛÛÛ* *****ÛÛÛÛÛÛ***ÛÛÛÛÛÛÛÛÛÛ**ÛÛ****ÛÛÛÛÛÛÛÛ**ÛÛ***ÛÛÛÛÛÛÛ*****ÛÛÛÛÛ*ÛÛÛÛ*ÛÛÛÛÛÛÛÛ* *****ÛÛÛÛÛÛÛ***ÛÛÛÛÛÛÛÛÛ**ÛÛÛ***Û***ÛÛÛÛÛÛÛ*****ÛÛÛÛÛÛ****ÛÛÛÛÛÛ***ÛÛÛÛÛÛÛÛÛÛ** ******ÛÛÛÛÛÛ******ÛÛÛÛÛ****ÛÛÛÛ*Û***ÛÛÛÛÛÛ***Û**ÛÛÛÛÛÛÛ***ÛÛÛÛÛÛ****ÛÛÛÛÛÛÛÛÛ** ******ÛÛÛÛÛÛÛ*****ÛÛÛÛ******ÛÛÛÛÛÛÛÛÛÛÛÛÛ***ÛÛ****ÛÛÛÛÛÛÛÛÛÛÛÛÛ*******ÛÛÛÛÛ**** *******ÛÛÛÛÛÛÛÛÛÛÛÛÛ**********ÛÛÛÛÛÛÛÛÛ****ÛÛÛ*******ÛÛÛÛÛÛÛÛÛ***************** ************ÛÛÛÛ********************ÛÛÛ*ÛÛÛÛÛÛ********************************* *************************************ÛÛÛÛÛÛÛ*****************************'08*** **DSRG************************************************************************* ******************Nothing*Is*As*Powerful*As*The*Written*Word******************* *******************************************************************************
******************************************************************************* INFO ******************************************************************************* Title................: Managing the Human Factor in Information Security Type.................: Ebook Reader...............: PDF Reader Size.................: 1.79 MB Torrent Hash.........: 2601A641EFF0C05C2B1891B0AD0A1FD3EA4557AF Posted by............: ~tqw~
Trackers: hxxp://tracker.bitreactor.to:2710/announce hxxp://genesis.1337x.org:1337/announce
Note: Bitreactor is back up and running.
******************************************************************************* CONTENTS *******************************************************************************
Synopsis: With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals.
Table Of Contents: Foreword Introduction Ch. 1 Power to the people Ch. 2 Everyone makes a difference Ch. 3 There's no such thing as an isolated incident Ch. 4 Zen and the art of risk management Ch. 5 Who can you trust? Ch. 6 Managing organization culture and politics Ch. 7 Designing effective awareness programs Ch. 8 Transforming organization attitudes and behavior Ch. 9 Gaining executive board and business buy-in Ch. 10 Designing security systems that work Ch. 11 Harnessing the power of the organization In conclusion Bibliography Index
Product Details: * ISBN: 0470721995 * ISBN-13: 9780470721995 * Format: Paperback, 384pp * Publisher: Wiley, John & Sons, Incorporated * Pub. Date: March 2009
******************************************************************************* Greetz Fellow UL'ers ******************************************************************************* mazuki `jedi Flatline newartriot aXXo KingBen Paulx1 unisonband |