Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1351
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSchror, Jordan, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:56Z-
dc.date.available2020-05-17T08:27:56Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484228357 ;en_US
dc.identifier.isbn1484228359 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1351-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityJordan Schroederen_US
dc.description.tableofcontentsAt a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System ;en_US
dc.description.tableofcontentsChapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks ;en_US
dc.description.tableofcontentsCopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Worke; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters ;en_US
dc.description.tableofcontentsWombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index ;en_US
dc.format.extent1 online resource ;en_US
dc.format.extentIncludes bibliographical references and index ;en_US
dc.publisherApress,en_US
dc.publisherDistributed to the book trade worldwide by Springer,en_US
dc.relation.haspart9781484228357.pdfen_US
dc.subjectComputer security ;en_US
dc.subjectComputer networks ; Security measures ;en_US
dc.titleAdvanced persistent training :en_US
dc.title.alternativetake your security awareness program to the next level /en_US
dc.typeBooken_US
dc.publisher.place[United States] :en_US
dc.publisher.placeNew York, NY :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484228357.pdf1.13 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSchror, Jordan, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:56Z-
dc.date.available2020-05-17T08:27:56Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484228357 ;en_US
dc.identifier.isbn1484228359 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1351-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityJordan Schroederen_US
dc.description.tableofcontentsAt a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System ;en_US
dc.description.tableofcontentsChapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks ;en_US
dc.description.tableofcontentsCopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Worke; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters ;en_US
dc.description.tableofcontentsWombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index ;en_US
dc.format.extent1 online resource ;en_US
dc.format.extentIncludes bibliographical references and index ;en_US
dc.publisherApress,en_US
dc.publisherDistributed to the book trade worldwide by Springer,en_US
dc.relation.haspart9781484228357.pdfen_US
dc.subjectComputer security ;en_US
dc.subjectComputer networks ; Security measures ;en_US
dc.titleAdvanced persistent training :en_US
dc.title.alternativetake your security awareness program to the next level /en_US
dc.typeBooken_US
dc.publisher.place[United States] :en_US
dc.publisher.placeNew York, NY :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484228357.pdf1.13 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSchror, Jordan, ; author ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:56Z-
dc.date.available2020-05-17T08:27:56Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484228357 ;en_US
dc.identifier.isbn1484228359 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1351-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.statementofresponsibilityJordan Schroederen_US
dc.description.tableofcontentsAt a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System ;en_US
dc.description.tableofcontentsChapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks ;en_US
dc.description.tableofcontentsCopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Worke; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters ;en_US
dc.description.tableofcontentsWombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index ;en_US
dc.format.extent1 online resource ;en_US
dc.format.extentIncludes bibliographical references and index ;en_US
dc.publisherApress,en_US
dc.publisherDistributed to the book trade worldwide by Springer,en_US
dc.relation.haspart9781484228357.pdfen_US
dc.subjectComputer security ;en_US
dc.subjectComputer networks ; Security measures ;en_US
dc.titleAdvanced persistent training :en_US
dc.title.alternativetake your security awareness program to the next level /en_US
dc.typeBooken_US
dc.publisher.place[United States] :en_US
dc.publisher.placeNew York, NY :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484228357.pdf1.13 MBAdobe PDFThumbnail
Preview File