Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1351
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Schror, Jordan, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:56Z | - |
dc.date.available | 2020-05-17T08:27:56Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484228357 ; | en_US |
dc.identifier.isbn | 1484228359 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1351 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Jordan Schroeder | en_US |
dc.description.tableofcontents | At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System ; | en_US |
dc.description.tableofcontents | Chapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks ; | en_US |
dc.description.tableofcontents | CopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Worke; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters ; | en_US |
dc.description.tableofcontents | Wombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.format.extent | Includes bibliographical references and index ; | en_US |
dc.publisher | Apress, | en_US |
dc.publisher | Distributed to the book trade worldwide by Springer, | en_US |
dc.relation.haspart | 9781484228357.pdf | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Computer networks ; Security measures ; | en_US |
dc.title | Advanced persistent training : | en_US |
dc.title.alternative | take your security awareness program to the next level / | en_US |
dc.type | Book | en_US |
dc.publisher.place | [United States] : | en_US |
dc.publisher.place | New York, NY : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484228357.pdf | 1.13 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Schror, Jordan, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:56Z | - |
dc.date.available | 2020-05-17T08:27:56Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484228357 ; | en_US |
dc.identifier.isbn | 1484228359 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1351 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Jordan Schroeder | en_US |
dc.description.tableofcontents | At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System ; | en_US |
dc.description.tableofcontents | Chapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks ; | en_US |
dc.description.tableofcontents | CopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Worke; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters ; | en_US |
dc.description.tableofcontents | Wombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.format.extent | Includes bibliographical references and index ; | en_US |
dc.publisher | Apress, | en_US |
dc.publisher | Distributed to the book trade worldwide by Springer, | en_US |
dc.relation.haspart | 9781484228357.pdf | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Computer networks ; Security measures ; | en_US |
dc.title | Advanced persistent training : | en_US |
dc.title.alternative | take your security awareness program to the next level / | en_US |
dc.type | Book | en_US |
dc.publisher.place | [United States] : | en_US |
dc.publisher.place | New York, NY : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484228357.pdf | 1.13 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Schror, Jordan, ; author ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:56Z | - |
dc.date.available | 2020-05-17T08:27:56Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484228357 ; | en_US |
dc.identifier.isbn | 1484228359 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1351 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Jordan Schroeder | en_US |
dc.description.tableofcontents | At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System ; | en_US |
dc.description.tableofcontents | Chapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks ; | en_US |
dc.description.tableofcontents | CopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Worke; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters ; | en_US |
dc.description.tableofcontents | Wombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index ; | en_US |
dc.format.extent | 1 online resource ; | en_US |
dc.format.extent | Includes bibliographical references and index ; | en_US |
dc.publisher | Apress, | en_US |
dc.publisher | Distributed to the book trade worldwide by Springer, | en_US |
dc.relation.haspart | 9781484228357.pdf | en_US |
dc.subject | Computer security ; | en_US |
dc.subject | Computer networks ; Security measures ; | en_US |
dc.title | Advanced persistent training : | en_US |
dc.title.alternative | take your security awareness program to the next level / | en_US |
dc.type | Book | en_US |
dc.publisher.place | [United States] : | en_US |
dc.publisher.place | New York, NY : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484228357.pdf | 1.13 MB | Adobe PDF | Preview File |