|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
JSTOR_ocn669758669 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
100714s2009 enka ob 000 0 eng d |
040 |
|
|
|a MNU
|b eng
|e pn
|c MNU
|d OCLCQ
|d N$T
|d OCLCQ
|d OCLCF
|d JSTOR
|d NLGGC
|d YDXCP
|d IYU
|d EBLCP
|d STF
|d IDEBK
|d CEF
|d E7B
|d DKDLA
|d DEBSZ
|d CDX
|d B24X7
|d COO
|d C6I
|d OCLCQ
|d LOA
|d JBG
|d COCUF
|d AGLDB
|d MOR
|d PIFAG
|d ZCU
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCA
|d IOG
|d U3W
|d OCLCA
|d EZ9
|d WRM
|d VTS
|d ICG
|d INT
|d VT2
|d OCLCQ
|d WYU
|d LVT
|d OCLCQ
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d VLY
|d BRF
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 505429937
|a 609854791
|a 692309621
|a 704518491
|a 764548970
|a 768664199
|a 772546260
|a 904587235
|a 960207211
|a 961550919
|a 962619995
|a 988477624
|a 991923693
|a 1037942076
|a 1038663166
|a 1055376094
|a 1058858397
|a 1081255062
|a 1097150855
|a 1162386129
|a 1192344701
|a 1228569635
|a 1240531774
|a 1289519167
|
020 |
|
|
|a 9781849280112
|q (electronic bk.)
|
020 |
|
|
|a 1849280118
|q (electronic bk.)
|
020 |
|
|
|a 184928010X
|
020 |
|
|
|a 9781849280105
|
020 |
|
|
|z 9781849280105
|
020 |
|
|
|a 1282384759
|
020 |
|
|
|a 9781282384750
|
020 |
|
|
|a 9786612384752
|
020 |
|
|
|a 6612384751
|
024 |
3 |
|
|a 9781849280105
|
029 |
1 |
|
|a AU@
|b 000050965352
|
029 |
1 |
|
|a AU@
|b 000051557511
|
029 |
1 |
|
|a AU@
|b 000054176267
|
029 |
1 |
|
|a CDX
|b 11550203
|
029 |
1 |
|
|a DEBBG
|b BV043097250
|
029 |
1 |
|
|a DEBBG
|b BV044141736
|
029 |
1 |
|
|a DEBSZ
|b 396333354
|
029 |
1 |
|
|a DEBSZ
|b 42152894X
|
029 |
1 |
|
|a GBVCP
|b 803408358
|
029 |
1 |
|
|a NZ1
|b 13869883
|
035 |
|
|
|a (OCoLC)669758669
|z (OCoLC)505429937
|z (OCoLC)609854791
|z (OCoLC)692309621
|z (OCoLC)704518491
|z (OCoLC)764548970
|z (OCoLC)768664199
|z (OCoLC)772546260
|z (OCoLC)904587235
|z (OCoLC)960207211
|z (OCoLC)961550919
|z (OCoLC)962619995
|z (OCoLC)988477624
|z (OCoLC)991923693
|z (OCoLC)1037942076
|z (OCoLC)1038663166
|z (OCoLC)1055376094
|z (OCoLC)1058858397
|z (OCoLC)1081255062
|z (OCoLC)1097150855
|z (OCoLC)1162386129
|z (OCoLC)1192344701
|z (OCoLC)1228569635
|z (OCoLC)1240531774
|z (OCoLC)1289519167
|
037 |
|
|
|a 22573/ctt4k56bb
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b B553 2009eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Blackwell, Clive.
|
245 |
1 |
4 |
|a The insider threat :
|b combatting the enemy within /
|c Clive Blackwell.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2009.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a CHAPTER 1: MODELLING THE INSIDER THREAT; What is the insider threat?; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; CHAPTER 2: INSIDER ATTACKS; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; APPENDIX: FURTHER READING; ITG RESOURCES.
|
520 |
|
|
|a The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information much more difficult than in the past. This new pocket guide intends to shed light on the key security issues facing organisations from insiders to get them up to speed quickly.
|
546 |
|
|
|a English.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Employee crimes
|x Prevention.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Employee crimes
|x Prevention
|2 fast
|
740 |
0 |
|
|a ITPro.
|
776 |
1 |
|
|z 9781849280105
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh7t8
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25564858
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00034453
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 11550203
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL480373
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10439464
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391163
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 238475
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3235686
|
994 |
|
|
|a 92
|b IZTAP
|