Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Solution Chemistry: Advances in Research and Applications
$85.50
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Bestsellers
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Introduction to Graph and Hypergraph Theory
04.Wiki Supporting Formal and Informal Learning
05.Intelligent Vehicle Systems: A 4D/RCS Approach
06.Artificial Intelligence in Energy and Renewable Energy Systems
07.Advances in Security Information Management: Perceptions and Outcomes
08.Computer Vision and Robotics
09.MOSFETs: Properties, Preparations and Performance
10.Expert Systems Research Trends
Notifications more
NotificationsNotify me of updates to Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection
Tell A Friend
 
Tell someone you know about this product.
Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection
Retail Price: $160.00
10% Online Discount
You Pay:

$144.00
Editors: Mils Hills (Northampton Business School, University of Northampton, UK)
Book Description:
This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional reflection and is designed to be a source of ideas and approaches that can be adopted for application in the real world by those who recognize that conventional ways of defining and considering cyber-attack are insufficient.
All of the authors believe that the term “cyber” must be urgently wrestled back from the technologists, cyber security professionals, consultancies and corporate silos that have hijacked it (seemingly without any resistance) and rendered the term essentially meaningless. The authors write from applied and often unique experiences in a range of commercial, consulting, state and defense environments.
Many of the authors of this volume have direct experience of inflicting, reporting on and protecting organizations from such effects, and also have knowledge of taking the challenge to additional levels. Most consultancies, academics and “experts” don’t live in the real world, are content with operating in the commoditized world of cyber-technical security and don’t have the intellectual capacity to understand, engage with or monetize this more challenging reality. This book is intended to help organizations improve preparedness for the established cyber world reality. (Imprint: Nova)

We’ve partnered with Copyright Clearance Center to make it easy for you to request permissions to reuse Nova content.
For more information, click here or click the "Get Permission" button below to link directly to this book on Copyright Clearance Center's website.


Table of Contents:
Preface

Author Biographies

Chapter 1 pp. 1-22. We’re Doomed! – And Your Problem Is? How I Learned to Stop Worrying and Love Cyber Insecurity
(Keith Scott, De Montfort University, Leicester, UK)

Chapter 2 pp. 23-36. An Information Operations Perspective on Cyber-Security
(Dr John Ardis, Information Operations Consultant)

Chapter 3 pp. 37-46. Sensitising the Legal Industry to the Need for Robust, Risk-Conscious Organisational Behaviour
(David Wood, IT Director for FDR Law LLP)

Chapter 4 pp. 47-60. 7 Maxims for an Information Security Age
(Graham Palmer, MSc Information Security, CISSP, ISSMP, MBCS)

Chapter 5 pp. 61-70. The Geek Shall Not Inherit the Earth: Why Senior Management Teams Already have the Answers to Effective Security in our Cyber World
(Clint Barker, MBA, University of Northampton, UK)

Chapter 6 pp. 71-80. Towards Cyber-Resilient & Sustainable SMES: The Case Study of Added Value from a Large IT Re-Seller
(Mils Hills and Louise Atkinson, Associate Professor in Risk, Resilience & Corporate Security / Research Fellow, Northampton Business School, University of Northampton, UK)

Chapter 7 pp. 81-104. Socio-Technical Gambits that Destroy Cyber Security & Organisational Resilience
(Mils Hills, Associate Professor in Risk, Resilience & Corporate Security, Northampton Business School, University of Northampton, UK)

Chapter 8 pp. 105-118. Persuasion in the Microblog: Understanding and Identifying Persuasive Intent in Terse Text
(Stefanie Hills, Thomas Jackson and Martin Sykora, Loughborough University, UK)

Chapter 9 pp. 119-128. Exercising Your Cyber Resilience Plan
(Nick Simms, Director, Cornwood Risk Management, UK)

Chapter 10 pp. 129-158. Informing Business Strategists about the Cyber Threat: Why Not Play Serious Games?
(Paul Théron, Thales Group)

Chapter 11 pp. 159-166. Swimming to the Strategic Vision: Lessons from Triumphing Over Adversity to Managing Cyber Crises
(Guy Batchelor, Founder, MinervaElite Consulting, UK)

Chapter 12 pp. 167-182. Redefining Network Intrusions as Threat Systems: Towards a Socio Technical Approach to Threat Analysis
(Stewart K. Bertram, School of International Relations - University of St Andrews, Scotland)

Chapter 13 pp. 183-198. A ‘Next Gen’ Approach to Cyber Attack Detection, Prevention and Response
(Arun Warikoo, Founder, CyPro)

Index

   Series:
      Computer Science, Technology and Applications
   Binding: Hardcover
   Pub. Date: 2016 - 4th Quarter
   Pages: 6x9 - (NBC-C)
   ISBN: 978-1-53610-090-7
   Status: AV
  
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
  
Special Focus Titles
01.Chaliapin and the Jews: The Question of Chaliapin's Purported Antisemitism
02.The Humanities: Past, Present and Future
03.The Poles: Myths and Reality
04.Child-Rearing: Practices, Attitudes and Cultural Differences
05."A Home Away from Home": A Community of International and South African University Students
06.Palliative Care: Oncology Experience from Hong Kong
07.The Enigma of Autism: Genius, Disorder or Just Different?
08.The Collector Mentality: Modernization of the Hunter-Gatherer
09.Face Processing: Systems, Disorders and Cultural Differences
10.Occurrences, Structure, Biosynthesis, and Health Benefits Based on Their Evidences of Medicinal Phytochemicals in Vegetables and Fruits. Volume 8
11.Crystal Growth: Concepts, Mechanisms and Applications
12.The Economic, Social and Political Impact of Mining on Akyem Abuakwa from the Pre-Colonial Era up to 1943

Nova Science Publishers
© Copyright 2004 - 2017

Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection