<p/><br></br><p><b> Book Synopsis </b></p></br></br>With the growth in social networking and the potential for larger and larger breaches of sensitive data, it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals<p/><br></br><p><b> From the Back Cover </b></p></br></br><p><b>"Computers do not commit crimes. People do."</b> <p>The biggest threat to information security is the "human factor", the influence of people. Even the best people will make mistakes, cause breaches and create security weaknesses that enable criminals to steal, corrupt or manipulate systems and data. The explosion in social networking and mobile computing is intensifying this problem. <p>For the first time, this book brings together theories and methods which will help you to change and harness people's security behaviour. It will help you to: <ul> <li>Understand and manage major crises and risk</li> <li>Appreciate the nature of the insider threat</li> <li>Navigate organization culture and politics</li> <li>Build better awareness programmes</li> <li>Transform user attitudes and behaviour</li> <li>Gain Executive Board buy-in</li> <li>Design management systems that really work</li> <li>Harness the power of your organization</li> </ul> <p>Based on the author's own personal experience of working with large, complex organizations, such as Shell and Royal Mail, this book is written by an information security insider and makes essential reading for all information security professionals. <p>"We live in an age where social networks, collaborative working and community development are global and commonplace, redefining the role of information security. David takes a dry-as-dust elephant of a subject and expertly serves it up in edible, even tasty, morsels."<br> <b>JP Rangaswami, Managing Director of BT Design</b> <p>"A highly entertaining read that will undoubtedly become essential reading for all security professionals."<br> <b>Professor Fred Piper</b> <p>"I'm really interested in reading this book and, frankly, once it's published, I'll be one of the first to buy it."<br> <b>Dr. Eugene Schultz, High Tower Software</b><p/><br></br><p><b> About the Author </b></p></br></br><strong>David Lacey</strong> is a leading authority on Information Security management with more than 25 years professional experience, gained in senior leadership roles in Royal Dutch/Shell Group, Royal Mail Group and the British Foreign & Commonwealth Office. David is now a freelance director, researcher, writer and a consultant to organisations, venture capitalists and technology companies. He also writes a leading blog on IT Security for <em>Computer Weekly</em>, the largest circulation UK technology magazine.
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us