|
|
|
|
LEADER |
00000cam a2200000xi 4500 |
001 |
b11612377 |
003 |
CoU |
005 |
20221209062116.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
150914t20162016nyua ob 001 0 eng d |
019 |
|
|
|a 954617590
|a 959276386
|a 960447738
|a 960737888
|a 965739846
|a 980292360
|a 1028937524
|a 1035435123
|a 1058372603
|a 1097092687
|a 1125098463
|
020 |
|
|
|a 1317750284
|q (ebk)
|
020 |
|
|
|a 9781317750284
|
020 |
|
|
|a 9781315796352
|
020 |
|
|
|a 131579635X
|
020 |
|
|
|a 9781317750277
|
020 |
|
|
|a 1317750276
|
020 |
|
|
|a 9781317750260
|
020 |
|
|
|a 1317750268
|
020 |
|
|
|a 9781848725652
|
020 |
|
|
|a 1848725655
|
020 |
|
|
|a 9781848725669
|
020 |
|
|
|a 1848725663
|
024 |
8 |
|
|a 99975788354
|
035 |
|
|
|a (OCoLC)tfe959608820
|
035 |
|
|
|a (OCoLC)959608820
|z (OCoLC)954617590
|z (OCoLC)959276386
|z (OCoLC)960447738
|z (OCoLC)960737888
|z (OCoLC)965739846
|z (OCoLC)980292360
|z (OCoLC)1028937524
|z (OCoLC)1035435123
|z (OCoLC)1058372603
|z (OCoLC)1097092687
|z (OCoLC)1125098463
|
037 |
|
|
|a tfe9781315796352
|
040 |
|
|
|a IDEBK
|b eng
|e rda
|e pn
|c IDEBK
|d TYFRS
|d YDX
|d N$T
|d OCLCO
|d OCLCQ
|d OCLCO
|d IDEBK
|d OCLCO
|d CCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UPM
|d U3W
|d OCLCA
|d OCLCF
|d OCLCO
|d OCLCQ
|d CEF
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCQ
|d UKMGB
|d UAB
|d K6U
|d OCLCO
|d OCLCQ
|
049 |
|
|
|a GWRE
|
050 |
|
4 |
|a HD8039.D37
|b P79 2016eb
|
245 |
0 |
0 |
|a Psychosocial dynamics of cyber security /
|c edited by Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, and Julie A. Steinke.
|
264 |
|
1 |
|a New York :
|b Routledge, Taylor & Francis Group,
|c 2016.
|
264 |
|
4 |
|c ©2016.
|
300 |
|
|
|a 1 online resource (xxx, 321 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a computer
|b c
|2 rdamedia.
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier.
|
490 |
1 |
|
|a Series in applied psychology.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a 1. The psychosocial dynamics of cyber security : an overview / Stephn J. Zaccaro [and others] -- 2. A comprehensive multilevel taxonomy of cyber security incident response perfoemance / Stephn J. Zaccaro [and others] -- 3. The role of processes in security operations centers / Sandeep Bhatt [and others] -- 4. Escalation : an enderstudied team decision-making structure / Reeshad S. Dalal [and others] -- 5. Insider threat in cyber security : what the organizational psychology literature on counterproductive work behavior can and cannot (yet) tell us / Reeshad S. Dala and Aiva K. Gorab -- 6. Creativity and innovation in cyber security work / Julie A. Steinke [and others] -- 7. Cyber security executive leadership / Richard Klimoski and James Murray -- 8. Requisite attributes for cyber security personnel and teams : cyber risk mitigation through talent management / Irwin Jose, Kate LaPort, and D. Matthew Trippe -- 9. Selection and staffing of cyber security positions / Rose Mueller-Hanson and Maya Garza -- 10. Training cyber security personnel / Bradley J. Brummel, John Hale, and Matthew J. Mol -- 11. Designing meaningful, healthy, and effective cyber security work / Sharon K. Parker, Carolyn J. Winslow, and Lois E. Tetrick -- 12. Factors influencing the human-technology interface for effective cyber security performance / Michael D. Coovert, Rachel Dreibelbis, and Randy Borum -- 13. Technological solutions for improving performance of cyber security analysts / Massimiliano Albanese and Sushil Jajodia -- 14. Conclusions and directions for future research / Loise E. Tetrick [and others]
|
588 |
0 |
|
|a Print version record.
|
650 |
|
0 |
|a Computer programmers
|x Job stress.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Job stress.
|
650 |
|
0 |
|a Data protection.
|0 http://id.loc.gov/authorities/subjects/sh85035859.
|
650 |
|
0 |
|a Computer security.
|0 http://id.loc.gov/authorities/subjects/sh90001862.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh94001277.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh2009127217.
|
650 |
|
0 |
|a Psychology, Industrial.
|0 http://id.loc.gov/authorities/subjects/sh85108476.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484.
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958.
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129.
|
650 |
|
7 |
|a Psychology, Industrial.
|2 fast
|0 (OCoLC)fst01081592.
|
700 |
1 |
|
|a Zaccaro, Stephen J.,
|e editor.
|0 http://id.loc.gov/authorities/names/n85372574
|1 http://isni.org/isni/0000000117433011.
|
700 |
1 |
|
|a Dalal, Reeshad S.,
|e editor.
|0 http://id.loc.gov/authorities/names/n2013001585
|1 http://isni.org/isni/0000000399846980.
|
700 |
1 |
|
|a Tetrick, Lois E.,
|e editor.
|0 http://id.loc.gov/authorities/names/n95054471
|1 http://isni.org/isni/0000000109854190.
|
700 |
1 |
|
|a Steinke, Julie A.,
|e editor.
|0 http://id.loc.gov/authorities/names/no2016119349.
|
776 |
0 |
8 |
|i Print version:
|z 9781317750284.
|
830 |
|
0 |
|a Series in applied psychology (New York, N.Y.)
|0 http://id.loc.gov/authorities/names/n88525753.
|
856 |
4 |
0 |
|u https://colorado.idm.oclc.org/login?url=https://www.taylorfrancis.com/books/9781315796352
|z Full Text (via Taylor & Francis)
|
907 |
|
|
|a .b116123771
|b 02-01-23
|c 01-22-21
|
998 |
|
|
|a web
|b 01-31-23
|c b
|d b
|e -
|f eng
|g nyu
|h 0
|i 1
|
907 |
|
|
|a .b116123771
|b 01-31-23
|c 01-22-21
|
944 |
|
|
|a MARS - RDA ENRICHED
|
915 |
|
|
|a -
|
956 |
|
|
|a Taylor & Francis Ebooks
|
956 |
|
|
|b Taylor & Francis All eBooks
|
999 |
f |
f |
|i dbc92e45-9688-5c21-86a3-82b7a1adb00b
|s dc8472dc-63b6-56aa-9a50-5032b359924f
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Online
|c Online
|d Online
|e HD8039.D37 P79 2016eb
|h Library of Congress classification
|i web
|n 1
|