|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
JSTOR_ocn965929257 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
161214s2016 enk ob 000 0 eng d |
040 |
|
|
|a JSTOR
|b eng
|e rda
|e pn
|c JSTOR
|d YDX
|d OCLCF
|d TEFOD
|d EBLCP
|d COO
|d MERUC
|d UAB
|d K6U
|d OTZ
|d LIV
|d OCLCQ
|d IOG
|d REB
|d VT2
|d D6H
|d N$T
|d AGLDB
|d IGB
|d SNK
|d INTCL
|d MHW
|d BTN
|d AUW
|d VVB
|d OCLCQ
|d VTS
|d UOK
|d WYU
|d G3B
|d LVT
|d S8I
|d S8J
|d S9I
|d C6I
|d STF
|d UKAHL
|d OCLCQ
|d BRF
|d UX1
|d OCLCO
|d INARC
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 966257885
|a 966794849
|a 1175625761
|
020 |
|
|
|a 9781849288408
|q (electronic bk.)
|
020 |
|
|
|a 1849288402
|q (electronic bk.)
|
020 |
|
|
|z 1849288399
|
020 |
|
|
|z 9781849288392
|
020 |
|
|
|z 9781849288415
|
020 |
|
|
|z 1849288410
|
029 |
1 |
|
|a AU@
|b 000060338616
|
035 |
|
|
|a (OCoLC)965929257
|z (OCoLC)966257885
|z (OCoLC)966794849
|z (OCoLC)1175625761
|
037 |
|
|
|a 22573/ctt1cdqhpd
|b JSTOR
|
037 |
|
|
|a 912FE301-825D-4914-A9F6-C5DB96EFFAF2
|b OverDrive, Inc.
|n http://www.overdrive.com
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a UA23
|b .M45 2016eb
|
072 |
|
7 |
|a POL
|x 017000
|2 bisacsh
|
082 |
0 |
4 |
|a 352.3/79
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mehan, Julie E.,
|e author.
|
245 |
1 |
0 |
|a Insider threat :
|b a guide to understanding, detecting, and defending against the enemy from within /
|c Dr. Julie E. Mehan.
|
264 |
|
1 |
|a Ely, Cambridgeshire, United Kingdom :
|b IT Governance Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource (301 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Detailing the measures that organizations can implement to ensure high-impact quick wins, this in-depth book looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. --
|c Edited summary from book.
|
505 |
0 |
|
|a Cover -- Title -- Copyright -- Preface -- About the Author -- Acknowledgements -- Contents -- Introduction -- Chapter 1: The Hidden Threat -- Why The Insider Threat is Called 'The Hidden Threat' -- Defining the Insider -- Insider Threat Has Many Forms -- Chapter 2: Insider Threat Models and Indicators -- The Bricks and Mortar Insider -- Hard Copy-Based Insider -- The Transitional Insider -- Bits and Bytes Insider -- Behavior Traits and Patterns Associated with Insider Threat -- Insider Motivations and Enablers -- The Psychology of an Insider -- The Snowden Case -- Organizational Characteristics and Insider Threat -- The Life Stages of the Insider Threat -- The Radicalized Insider Threat -- A Note of Caution -- Privacy and Ethical Concerns -- Chapter 3: The Unintentional Insider Threat -- Social Engineering -- The Careless UIT -- Social Media and the UIT -- Chapter 4: Insider Threat, Big Data and the Cloud -- Cloud Computing -- Big Data -- Cloud Computing & Big Data Insider Threat Concerns -- FedRAMP -- US Efforts to Secure the Cloud against Insider Threat -- Chapter 5: Regional Perspectives on Insider Threat -- Regional Perspectives -- Different Views on Insider Threat -- Chapter 6: Best Practices, Controls and Quick Wins -- Policy and Strategic Initiatives -- Training and Awareness -- Personnel Security and Management -- Prevention and Deterrence -- Reaction, Response, and Recovery -- Insider Threat 'Worst Practices' -- Chapter 7: Final Thoughts -- End Notes -- ITG Resources.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Internal security
|z United States.
|
650 |
|
0 |
|a National security
|z United States.
|
650 |
|
7 |
|a POLITICAL SCIENCE / Public Affairs & Administration
|2 bisacsh
|
650 |
|
7 |
|a Internal security
|2 fast
|
650 |
|
7 |
|a National security
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Mehan, Julie.
|t Insider threat.
|d [Place of publication not identified] : It Governance Pub, 2016
|z 1849288399
|w (OCoLC)952547591
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1cd0mjc
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n insiderthreatgui0000meha
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36161763
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32139724
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4794154
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13298822
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1437066
|
994 |
|
|
|a 92
|b IZTAP
|