Insider threat protecting the enterprise from sabotage, spying, and theft /

Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to ana...

Πλήρης περιγραφή

Κύριος συγγραφέας: Cole, Eric.
Άλλοι συγγραφείς: Ring, Sandra.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Rockland, Mass. : Oxford : Syngress ; 2006.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597490481
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 02513nam a2200433 a 4500
001 1/44935
008 140721s2006 us 001 0 eng
020 |a 1423754999 (electronic bk.) 
020 |a 9781423754992 (electronic bk.) 
020 |a 0080489052 
020 |a 9780080489056 
020 |a 9781597490481 (pbk.) 
020 |a 1597490482 (pbk.) 
020 |a 1281035661 
020 |a 9781281035660 
035 |l 47892 
040 |a N$T  |b eng  |c N$T  |d OCLCQ  |d TUU  |d OCLCQ  |d B24X7  |d OCLCQ  |d OCLCO  |d OCLCQ  |d N15  |d E7B  |d YDXCP  |d IDEBK  |d NTG  |d WPG  |d DKDLA  |d ZCU  |d DEBBG  |d MERUC  |d FVL  |d UMI  |d DEBSZ  |d GR-PeUP 
100 1 |a Cole, Eric. 
245 1 0 |a Insider threat  |h [electronic resource] :  |b protecting the enterprise from sabotage, spying, and theft /  |c Eric Cole, Sandra Ring. 
260 |a Rockland, Mass. :  |b Syngress ;  |a Oxford :  |b Elsevier Science [distributor],  |c 2006. 
300 |a 1 online resource (1 v.) :  |b ill. 
500 |a Includes index. 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index; 
520 |a Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats. 
650 4 |a Computer networks  |x Security measures. 
650 4 |a Data protection. 
650 4 |a Computer security. 
650 4 |a Computer hackers. 
655 4 |a Electronic books. 
700 1 |a Ring, Sandra. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140721  |p 00b47892  |q 00b47892  |t ONLINE  |y 0 
856 4 |u http://www.sciencedirect.com/science/book/9781597490481 
856 4 |d /webopac/covers/03/47892_0080489052.jpg 
856 4 |d /webopac/covers/03/47892_9780080489056.jpg 
856 4 |d /webopac/covers/03/47892_9781597490481.jpg  |z (pbk.) 
856 4 |d /webopac/covers/03/47892_1597490482.jpg  |z (pbk.) 
856 4 |d /webopac/covers/03/47892_1281035661.jpg 
856 4 |d /webopac/covers/03/47892_9781281035660.jpg