globe
  1. Lecture 1: Introduction 4 items
    1. The History of Information Security: A Comprehensive Handbook - Karl de Leeuw, J. A. Bergstra 2007

      Book Essential

    2. The History of Information Security: A Comprehensive Handbook - Karl de Leeuw, J. A. Bergstra 2007 (electronic resource)

      Book Essential

  2. Lecture 2: Privacy - Rights, Principles and Legislation 2 items
    1. Privacy Principles and Data Protection Practices - Karen Lawrence OEqvist, Filip Johnssen 2017

      Book Essential

    2. The Right to Privacy - Samuel D. Warren, Louis D. Brandeis 1890

      Article Essential

  3. Lecture 3: Security Behaviours 1 4 items
  4. Lecture 4: Awareness, Education, and Training 4 items
  5. Lecture 5: Identity and Trust 4 items
    1. Users Are Not the Enemy - Anne Adams, Martina Angela Sasse 1999

      Article Essential

    2. From Weakest Link to Security Hero: Transforming Staff Security Behavior - Shari Lawrence Pfleeger, M. Angela Sasse, Adrian Furnham 2014

      Article Recommended

  6. Lectures 6 & 9: Implementing Data Privacy 1 & 2 4 items
    1. Privacy Principles and Data Protection Practices - Karen Lawrence OEqvist, Filip Johnssen 2017

      Book Essential

    2. The Privacy Engineer's Manifesto: Getting From Policy to Code to QA to Value - Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran 2014

      Book Recommended

  7. Lecture 7: Security Behaviours 2 4 items
  8. Lecture 8: Governing the Shadows 1 item
  9. Lecture 10: Social Engineering 6 items
    1. Influence: The Psychology of Persuasion - Robert B. Cialdini 2007

      Book Essential

    2. Influence: The Psychology of Persuasion - Robert B. Cialdini 2009 (electronic resource)

      Book Suggested for Student Purchase

    3. On the Anatomy of Human Hacking - Peter O. Okenyi, Thomas J. Owens 2007

      Article Recommended

    4. Social Engineering: The Art of Human Hacking - Christopher Hadnagy 2010

      Book Recommended

    5. Social Engineering: The Art of Human Hacking - Christopher Hadnagy 2011 (electronic resource)

      Book Recommended

    6. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker - Kevin D. Mitnick, William L. Simon 2011

      Book Recommended

  10. Lecture 11: Security Culture 2 items
All rights reserved ©