The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ [u.a.]
Addison-Wesley
2012
|
Schriftenreihe: | The Sei series in software engineering
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxxv, 389 p. Ill., graph. Darst. 24 cm |
ISBN: | 9780321812575 0321812573 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040283776 | ||
003 | DE-604 | ||
005 | 20201022 | ||
007 | t | ||
008 | 120629s2012 xxuad|| |||| 00||| eng d | ||
010 | |a 2011047338 | ||
020 | |a 9780321812575 |c hbk. : alk. paper |9 978-0-321-81257-5 | ||
020 | |a 0321812573 |c hbk. : alk. paper |9 0-321-81257-3 | ||
035 | |a (OCoLC)802517281 | ||
035 | |a (DE-599)BVBBV040283776 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-91G |a DE-706 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 658.4/78 | |
084 | |a DAT 055f |2 stub | ||
100 | 1 | |a Cappelli, Dawn |e Verfasser |4 aut | |
245 | 1 | 0 | |a The CERT guide to insider threats |b how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |c Dawn Cappelli ; Andrew Moore ; Randall Trzeciak |
264 | 1 | |a Upper Saddle River, NJ [u.a.] |b Addison-Wesley |c 2012 | |
300 | |a xxxv, 389 p. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Sei series in software engineering | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Employee crimes |x Prevention | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Moore, Andrew |e Sonstige |4 oth | |
700 | 1 | |a Trzeciak, Randall |e Sonstige |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-025139084 |
Datensatz im Suchindex
_version_ | 1804149294204190720 |
---|---|
any_adam_object | |
author | Cappelli, Dawn |
author_facet | Cappelli, Dawn |
author_role | aut |
author_sort | Cappelli, Dawn |
author_variant | d c dc |
building | Verbundindex |
bvnumber | BV040283776 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_tum | DAT 055f |
ctrlnum | (OCoLC)802517281 (DE-599)BVBBV040283776 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01934nam a2200517zc 4500</leader><controlfield tag="001">BV040283776</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201022 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120629s2012 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2011047338</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321812575</subfield><subfield code="c">hbk. : alk. paper</subfield><subfield code="9">978-0-321-81257-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321812573</subfield><subfield code="c">hbk. : alk. paper</subfield><subfield code="9">0-321-81257-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)802517281</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040283776</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cappelli, Dawn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The CERT guide to insider threats</subfield><subfield code="b">how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)</subfield><subfield code="c">Dawn Cappelli ; Andrew Moore ; Randall Trzeciak</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxv, 389 p.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Sei series in software engineering</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moore, Andrew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trzeciak, Randall</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025139084</subfield></datafield></record></collection> |
id | DE-604.BV040283776 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:20:44Z |
institution | BVB |
isbn | 9780321812575 0321812573 |
language | English |
lccn | 2011047338 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025139084 |
oclc_num | 802517281 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-706 |
owner_facet | DE-91G DE-BY-TUM DE-706 |
physical | xxxv, 389 p. Ill., graph. Darst. 24 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Addison-Wesley |
record_format | marc |
series2 | The Sei series in software engineering |
spelling | Cappelli, Dawn Verfasser aut The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli ; Andrew Moore ; Randall Trzeciak Upper Saddle River, NJ [u.a.] Addison-Wesley 2012 xxxv, 389 p. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier The Sei series in software engineering Includes bibliographical references and index Computer crimes Prevention Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s DE-604 Moore, Andrew Sonstige oth Trzeciak, Randall Sonstige oth |
spellingShingle | Cappelli, Dawn The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Computer crimes Prevention Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4010452-7 (DE-588)4011134-9 |
title | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_auth | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_exact_search | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_full | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli ; Andrew Moore ; Randall Trzeciak |
title_fullStr | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli ; Andrew Moore ; Randall Trzeciak |
title_full_unstemmed | The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Dawn Cappelli ; Andrew Moore ; Randall Trzeciak |
title_short | The CERT guide to insider threats |
title_sort | the cert guide to insider threats how to prevent detect and respond to information technology crimes theft sabotage fraud |
title_sub | how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
topic | Computer crimes Prevention Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Computer crimes Prevention Employee crimes Prevention Information technology Security measures Computer networks Security measures Data protection Computersicherheit Computerkriminalität Datenschutz |
work_keys_str_mv | AT cappellidawn thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT mooreandrew thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT trzeciakrandall thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud |