Insider threat protecting the enterprise from sabotage, spying, and theft /
Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to ana...
Κύριος συγγραφέας: | Cole, Eric. |
---|---|
Άλλοι συγγραφείς: | Ring, Sandra. |
Μορφή: | Ηλεκτρονική πηγή |
Γλώσσα: | English |
Στοιχεία έκδοσης: |
Rockland, Mass. : Oxford :
Syngress ;
2006.
|
Θέματα: | |
Διαθέσιμο Online: |
http://www.sciencedirect.com/science/book/9781597490481 |
Ετικέτες: |
Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
|
LEADER | 02513nam a2200433 a 4500 | ||
---|---|---|---|
001 | 1/44935 | ||
008 | 140721s2006 us 001 0 eng | ||
020 | |a 1423754999 (electronic bk.) | ||
020 | |a 9781423754992 (electronic bk.) | ||
020 | |a 0080489052 | ||
020 | |a 9780080489056 | ||
020 | |a 9781597490481 (pbk.) | ||
020 | |a 1597490482 (pbk.) | ||
020 | |a 1281035661 | ||
020 | |a 9781281035660 | ||
035 | |l 47892 | ||
040 | |a N$T |b eng |c N$T |d OCLCQ |d TUU |d OCLCQ |d B24X7 |d OCLCQ |d OCLCO |d OCLCQ |d N15 |d E7B |d YDXCP |d IDEBK |d NTG |d WPG |d DKDLA |d ZCU |d DEBBG |d MERUC |d FVL |d UMI |d DEBSZ |d GR-PeUP | ||
100 | 1 | |a Cole, Eric. | |
245 | 1 | 0 | |a Insider threat |h [electronic resource] : |b protecting the enterprise from sabotage, spying, and theft / |c Eric Cole, Sandra Ring. |
260 | |a Rockland, Mass. : |b Syngress ; |a Oxford : |b Elsevier Science [distributor], |c 2006. | ||
300 | |a 1 online resource (1 v.) : |b ill. | ||
500 | |a Includes index. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index; | |
520 | |a Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats. | ||
650 | 4 | |a Computer networks |x Security measures. | |
650 | 4 | |a Data protection. | |
650 | 4 | |a Computer security. | |
650 | 4 | |a Computer hackers. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Ring, Sandra. | |
852 | |a INST |b UNIPILB |c EBOOKS |e 20140721 |p 00b47892 |q 00b47892 |t ONLINE |y 0 | ||
856 | 4 | |u http://www.sciencedirect.com/science/book/9781597490481 | |
856 | 4 | |d /webopac/covers/03/47892_0080489052.jpg | |
856 | 4 | |d /webopac/covers/03/47892_9780080489056.jpg | |
856 | 4 | |d /webopac/covers/03/47892_9781597490481.jpg |z (pbk.) | |
856 | 4 | |d /webopac/covers/03/47892_1597490482.jpg |z (pbk.) | |
856 | 4 | |d /webopac/covers/03/47892_1281035661.jpg | |
856 | 4 | |d /webopac/covers/03/47892_9781281035660.jpg |