Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Insider threat [electronic resource] : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring.

By: Cole, Eric.
Contributor(s): Ring, Sandra.
Material type: TextTextPublisher: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2006Description: 1 online resource (1 v.) : ill.ISBN: 1423754999 (electronic bk.); 9781423754992 (electronic bk.); 0080489052; 9780080489056; 9781597490481 (pbk.); 1597490482 (pbk.); 1281035661; 9781281035660.Subject(s): Computer networks -- Security measures | Data protection | Computer security | Computer hackers | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Electronic booksGenre/Form: Electronic books. | Electronic books. | Electronic books.Additional physical formats: Print version:: Insider threat.DDC classification: 005.8 Online resources: EBSCOhost
Contents:
Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index;
Summary: Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes index.

Description based on print version record.

Includes bibliographical references and index.

Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index;

Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Insider threat by Cole, Eric. ©2006
Insider threat by Cole, Eric. ©2006
Insider threat by Cole, Eric. ©2006
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter