1
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

2
by Hadnagy, Christopher
Published 2011
Wiley
Subjects: ...Human-computer interaction / fast...

3
by Mitnick, Kevin, Simon, William L.
Published 2002
Wiley
...Focusing on the human factors involved with information security, Mitnick explains why all...

4
by Ozkaya, Erdal
Published 2018
Packt Publishing

5
by Carpenter, Perry, Roer, Kai
Published 2022
John Wiley & Sons, Inc.
...Mitigate human risk and bake security into your organization's culture from top to bottom...

6
by Carpenter, Perry, Roer, Kai
Published 2022
Ascent Audio
... into how to transform your organization's security culture and reduce human risk at every level. This book...

7
by Hany, John
Published 2019
Packt Publishing, Limited
Subjects: ...Computers / Social Aspects / Human-Computer Interaction / bisacsh...

8
by Crumlish, Christian, Malone, Erin
Published 2015
O'Reilly
Subjects: ...Human-computer interaction / fast...

9
by Rozga, Szymon
Published 2018
Apress
Table of Contents: ...Other FunctionsConversational Experience Guidelines; Focus; Don't Pretend the Bot Is a Human; Do...

10
by McCarthy, Jim, McCarthy, Michele
Published 2001
Addison Wesley Professional
Subjects: ...Computer software / Human factors / fast...

11
by Bahadur, Gary
Published 2012
McGraw-Hill
Table of Contents: ... media security policy best practices -- Human resources : strategy & collaboration -- Utilization...

12
by Neill, Colin J.
Published 2012
CRC Press
Table of Contents: ...Patterns and antipatterns -- Human patterns and antipatterns -- Group patterns and antipatterns...

13
by Skulkin, Oleg
Published 2022
Packt Publishing, Limited
Table of Contents: ...Section 1: Getting Started with a Modern Ransomware Attack -- Chapter 1: The History of Human...

14
by Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Table of Contents: ... -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information...

15
by Faircloth, Jeremy
Published 2011
Syngress
Table of Contents: ...Tools of the trade -- Reconnaissance -- Scanning and enumeration -- Client-side attacks and human...

16
by Dykstra, Josiah
Published 2016
O'Reilly Media
Table of Contents: ... analysis -- System security engineering -- Human-computer interaction and usable security -- Visualization...

17
by Hagar, Jon Duncan
Published 2014
CRC Press
Table of Contents: ... : "it's about time" -- Human user interface attacks : "the limited (and unlimited) user interface" -- Smart...

18
by Dalziel, Henry
Published 2015
Elsevier
Table of Contents: ... management -- Human resources security management -- Asset management -- Access management -- Cryptography...

19
by Winkler, Ira, Gomes, Araceli Treu
Published 2017
Syngress
Table of Contents: ...? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting...

20
by Desman, Mark B.
Published 2002
Auerbach Publications
Table of Contents: ... -- chapter 12 The Best Toys in Town -- chapter 13 Back to School -- chapter 14 Other Resources: Human...