Insider threat : protecting the enterprise from sabotage, spying, and theft /
Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to ana...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. : Oxford :
Syngress ; Elsevier Science [distributor],
2006.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocm64175752 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 060221s2006 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d TUU |d OCLCQ |d B24X7 |d OCLCQ |d OCLCO |d OCLCQ |d N15 |d E7B |d YDXCP |d IDEBK |d NTG |d WPG |d DKDLA |d ZCU |d DEBBG |d MERUC |d FVL |d UMI |d DEBSZ |d OCLCQ |d OCLCA |d UKDOC |d OCLCQ |d OCLCF |d TEFOD |d OCLCQ |d COO |d OCLCQ |d JBG |d AGLDB |d COCUF |d CNNOR |d PIFBR |d LIV |d OCLCQ |d WY@ |d OCLCA |d LUE |d D6H |d VTS |d CEF |d INT |d OCLCQ |d WYU |d OCLCQ |d STF |d M8D |d VT2 |d UKCRE |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d QGK |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 64668344 |a 84146872 |a 162597481 |a 181421109 |a 473722825 |a 475321964 |a 507245605 |a 593708223 |a 606030608 |a 647464649 |a 722429438 |a 728034127 |a 742284869 |a 815528826 |a 823108162 |a 823828863 |a 823898588 |a 824089875 |a 824136595 |a 824885576 |a 961584037 |a 962656567 |a 1153028880 |a 1259148201 | ||
020 | |a 1423754999 |q (electronic bk.) | ||
020 | |a 9781423754992 |q (electronic bk.) | ||
020 | |a 9780080489056 |q (electronic bk.) | ||
020 | |a 0080489052 |q (electronic bk.) | ||
020 | |a 1597490482 | ||
020 | |a 9781597490481 | ||
020 | |z 9781597490481 | ||
020 | |z 1597490482 | ||
020 | |z 1281035661 | ||
020 | |z 9781281035660 | ||
020 | |a 9786611035662 | ||
020 | |a 6611035664 | ||
020 | |a 1597490938 | ||
020 | |a 9781597490931 | ||
024 | 1 | |a 792502904824 | |
024 | 3 | |a 9781597490481 | |
029 | 1 | |a AU@ |b 000050492839 | |
029 | 1 | |a AU@ |b 000050965353 | |
029 | 1 | |a AU@ |b 000051557512 | |
029 | 1 | |a AU@ |b 000051859986 | |
029 | 1 | |a AU@ |b 000053224911 | |
029 | 1 | |a AU@ |b 000059266942 | |
029 | 1 | |a AU@ |b 000066757018 | |
029 | 1 | |a CHBIS |b 005829807 | |
029 | 1 | |a CHNEW |b 001004849 | |
029 | 1 | |a CHVBK |b 168409798 | |
029 | 1 | |a DEBBG |b BV039832334 | |
029 | 1 | |a DEBBG |b BV041119862 | |
029 | 1 | |a DEBBG |b BV042307394 | |
029 | 1 | |a DEBBG |b BV043075109 | |
029 | 1 | |a DEBSZ |b 396677487 | |
029 | 1 | |a DEBSZ |b 40531325X | |
029 | 1 | |a DEBSZ |b 422285269 | |
029 | 1 | |a DEBSZ |b 430324243 | |
029 | 1 | |a DKDLA |b 820120-katalog:000504489 | |
029 | 1 | |a GBVCP |b 785366016 | |
029 | 1 | |a NZ1 |b 12033480 | |
029 | 1 | |a NZ1 |b 15190343 | |
035 | |a (OCoLC)64175752 |z (OCoLC)64668344 |z (OCoLC)84146872 |z (OCoLC)162597481 |z (OCoLC)181421109 |z (OCoLC)473722825 |z (OCoLC)475321964 |z (OCoLC)507245605 |z (OCoLC)593708223 |z (OCoLC)606030608 |z (OCoLC)647464649 |z (OCoLC)722429438 |z (OCoLC)728034127 |z (OCoLC)742284869 |z (OCoLC)815528826 |z (OCoLC)823108162 |z (OCoLC)823828863 |z (OCoLC)823898588 |z (OCoLC)824089875 |z (OCoLC)824136595 |z (OCoLC)824885576 |z (OCoLC)961584037 |z (OCoLC)962656567 |z (OCoLC)1153028880 |z (OCoLC)1259148201 | ||
037 | |b 00991439 | ||
037 | |a 3D0B2726-1956-46B7-A23C-BF0B12557804 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.59 |b .C65 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a KM |2 bicssc | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Cole, Eric. | |
245 | 1 | 0 | |a Insider threat : |b protecting the enterprise from sabotage, spying, and theft / |c Eric Cole, Sandra Ring. |
260 | |a Rockland, Mass. : |b Syngress ; |a Oxford : |b Elsevier Science [distributor], |c 2006. | ||
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index. | |
520 | |a Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats. | ||
546 | |a English. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Hackers. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Pirates informatiques. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Hackers |2 fast | |
700 | 1 | |a Ring, Sandra. | |
758 | |i has work: |a Insider threat (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFYyCQ4C9RG9KR6Vbkw9WC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Cole, Eric. |t Insider threat. |d Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2006 |z 1597490482 |w (OCoLC)62344674 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597490481/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=254849 |z Texto completo |
938 | |a 123Library |b 123L |n 36484 | ||
938 | |a Books 24x7 |b B247 |n bks00005096 | ||
938 | |a ebrary |b EBRY |n ebr10110277 | ||
938 | |a EBSCOhost |b EBSC |n 149588 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 103566 | ||
938 | |a YBP Library Services |b YANK |n 2627187 | ||
938 | |a YBP Library Services |b YANK |n 2395180 | ||
938 | |a YBP Library Services |b YANK |n 2730621 | ||
994 | |a 92 |b IZTAP |