Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Copyright Foreword Preface About The Author Acknowledgements Contents CHAPTER 1: INTRODUCTION TO INFORMATION SECURITY CHAPTER 2: RISK MANAGEMENT CHAPTER 3: THE COMPLEXITY OF RISK MANAGEMENT CHAPTER 4: STAKEHOLDERS AND COMMUNICATION CHAPTER 5: INFORMATION SECURITY GOVERNANCE CHAPTER 6: PROBLEMS WITH POLICIES CHAPTER 7: HOW SECURITY MANAGERS MAKE DECISIONS CHAPTER 8: HOW USERS MAKE DECISIONS
There is no clear reason to comply The cost of compliance is too high There is an inability to comply
CHAPTER 9: SECURITY AND USABILITY CHAPTER 10: SECURITY CULTURE CHAPTER 11: THE PSYCHOLOGY OF COMPLIANCE CHAPTER 12: CONCLUSION - CHANGING THE APPROACH TO SECURITY
Design Culture Supervision and sanctioning
APPENDIX: ANALOGIES
Analogy 1: Cake and Security Analogy 2: Poker and Security
SOURCES ITG RESOURCES
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion