|
|
|||
|
||||
OverviewFrom the back cover: Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical. --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox. --Kevin Beaver, independent information security consultant with Principle Logic, LLC and author of Hacking For Dummies and Security On Wheels audio programs This is one of the most fun information security books I've read...it combines a fun storyline with easy to digest tips on information security for employees and even contains 'tear-down' tip sheets! --Dr. Anton Chuvakin, author of PCI Compliance, chuvakin.org While companies spend millions on security products, attackers continue to steal their corporate secrets (and customer data) by exploiting the asset most often ignored on the security budget - people. Organizations that want to keep their trade secrets a secret must find better ways to help employees understand the importance of security. Packed with suspenseful lessons and quick tips for employees, Cyber Within helps organizations take that challenge head-on. Full Product DetailsAuthor: Marcos Christodonte IIPublisher: Proactive Assurance LLC Imprint: Proactive Assurance LLC Dimensions: Width: 15.20cm , Height: 0.40cm , Length: 22.90cm Weight: 0.109kg ISBN: 9780615330150ISBN 10: 0615330150 Pages: 72 Publication Date: 16 January 2010 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Out of print, replaced by POD We will order this item for you from a manufatured on demand supplier. Table of ContentsReviewsAuthor InformationMarcos Christodonte II, MBA, CISSP, CCNA, GCIH, ITILv3 is a cyber and information security professional working for a consulting firm. He has developed security strategies for many government organizations including the U.S. Army, U.S. Navy and NATO. Tab Content 6Author Website:Countries AvailableAll regions |