Amazon cover image
Image from Amazon.com

Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring.

By: Contributor(s): Material type: TextTextPublication details: Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2006.Description: 1 online resource (1 volume) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1423754999
  • 9781423754992
  • 9780080489056
  • 0080489052
  • 1597490482
  • 9781597490481
  • 9786611035662
  • 6611035664
  • 1597490938
  • 9781597490931
Subject(s): Additional physical formats: Print version:: Insider threat.DDC classification:
  • 005.8 22
LOC classification:
  • TK5105.59 .C65 2006eb
Online resources:
Contents:
Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index.
Summary: Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Print version record.

Includes bibliographical references and index.

Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index.

Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats.

English.

Added to collection customer.56279.3

Powered by Koha