1
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

3
by Carpenter, Perry, Roer, Kai
Published 2022
John Wiley & Sons, Inc.
...Mitigate human risk and bake security into your organization's culture from top to bottom...

4
by Carpenter, Perry, Roer, Kai
Published 2022
Ascent Audio
... into how to transform your organization's security culture and reduce human risk at every level. This book...

5
by Kraft, Christian
Published 2012
Apress
Subjects: ...Human-computer interaction / fast...

6
by Neill, Colin J.
Published 2012
CRC Press
Table of Contents: ...Patterns and antipatterns -- Human patterns and antipatterns -- Group patterns and antipatterns...

7
by Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Table of Contents: ... -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information...

8
by Crawley, Kim
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ..., Human Hacker Extraordinaire -- The Importance of a Strong Security Culture -- Hackers Are the Bad Guys...

9
by Lowe, Janet
Published 2009
John Wiley & Sons
Table of Contents: ... -- and will they tell? ; Hello, human rights ; The great Chinese firewall ; Principles of freedom ; Copyright...

10
by Brown, Jason
Published 2023
Packt Publishing, Limited
Table of Contents: ...? -- Exploring IT risks -- Human -- Technology -- Environmental -- The NIST RMF...

11
by Stanier, James
Published 2020
The Pragmatic Bookshelf
Table of Contents: ... and the Carrot -- Mount Stupid -- It Isn't Just Humans ... -- The Eye of Sauron -- Victims of Your Own Success...

12
by Rybaric, Robert
Published 2023
Packt Publishing Ltd.
Table of Contents: ... Management -- Microsoft Dynamics 365 Commerce -- Microsoft Dynamics 365 Human Resources -- Microsoft Dynamics...

13
by Kahlout, Gabriele
Published 2017
Apress
Table of Contents: .... Minimize the number of buttons on forms; 2. Human message with every email...

14
by Svane, Mikkel, Adler, Carlye
Published 2015
Jossey-Bass, a Wiley brand
Table of Contents: ... and Adapt; Be Something Actual Humans Can Relate To; Be Transparent...

15
by Provost, Foster
Published 2013
O'Reilly Media
Table of Contents: ...: Humans in the Loop, Revisited -- Privacy, Ethics, and Mining Data About Individuals -- Is There More...

16
Published 2024
Assemble You
... by applying the generated formula to a real-world scenario. It’ll show the balance of human expertise and AI...

17
by Carpenter, Perry
Published 2019
Wiley
... other processes, controls, and technologies fail, humans are your last line of defense. But, how can you...

18
by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Published 2017
Packt Publishing
... testing and auditing Create an evil twin to intercept network traffic Identify human patterns in networks...

19
by Bott, Ed
Published 2007
Que
...readers will feel as though they are learning from real humans and not Microsoft clones. Sprinkled...

20
by Parr-Rud, Olivia
Published 2014
SAS Institute
... relationship management, as well as business processes and human resources. Topics include descriptive analysis...