Insider threat: protecting the enterprise from sabotage, spying, and theft
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
2006
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Includes bibliographical references and index Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats |
Beschreibung: | 1 Online-Ressource (1 volume) |
ISBN: | 0080489052 1281035661 1423754999 1597490482 9780080489056 9781281035660 9781423754992 9781597490481 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043075109 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2006 |||| o||u| ||||||eng d | ||
020 | |a 0080489052 |9 0-08-048905-2 | ||
020 | |a 1281035661 |9 1-281-03566-1 | ||
020 | |a 1423754999 |9 1-4237-5499-9 | ||
020 | |a 1597490482 |9 1-59749-048-2 | ||
020 | |a 9780080489056 |9 978-0-08-048905-6 | ||
020 | |a 9781281035660 |9 978-1-281-03566-0 | ||
020 | |a 9781423754992 |9 978-1-4237-5499-2 | ||
020 | |a 9781597490481 |9 978-1-59749-048-1 | ||
035 | |a (OCoLC)64175752 | ||
035 | |a (DE-599)BVBBV043075109 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cole, Eric |e Verfasser |4 aut | |
245 | 1 | 0 | |a Insider threat |b protecting the enterprise from sabotage, spying, and theft |c Eric Cole, Sandra Ring |
264 | 1 | |a Rockland, Mass. |b Syngress |c 2006 | |
300 | |a 1 Online-Ressource (1 volume) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index | ||
500 | |a Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Commercial crimes | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer hackers | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
700 | 1 | |a Ring, Sandra |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028499301 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175462009667584 |
---|---|
any_adam_object | |
author | Cole, Eric |
author_facet | Cole, Eric |
author_role | aut |
author_sort | Cole, Eric |
author_variant | e c ec |
building | Verbundindex |
bvnumber | BV043075109 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)64175752 (DE-599)BVBBV043075109 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03009nmm a2200589zc 4500</leader><controlfield tag="001">BV043075109</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489052</subfield><subfield code="9">0-08-048905-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035661</subfield><subfield code="9">1-281-03566-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754999</subfield><subfield code="9">1-4237-5499-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490482</subfield><subfield code="9">1-59749-048-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489056</subfield><subfield code="9">978-0-08-048905-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035660</subfield><subfield code="9">978-1-281-03566-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754992</subfield><subfield code="9">978-1-4237-5499-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490481</subfield><subfield code="9">978-1-59749-048-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64175752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043075109</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Insider threat</subfield><subfield code="b">protecting the enterprise from sabotage, spying, and theft</subfield><subfield code="c">Eric Cole, Sandra Ring</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commercial crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ring, Sandra</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028499301</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043075109 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:40Z |
institution | BVB |
isbn | 0080489052 1281035661 1423754999 1597490482 9780080489056 9781281035660 9781423754992 9781597490481 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028499301 |
oclc_num | 64175752 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (1 volume) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
spelling | Cole, Eric Verfasser aut Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring Rockland, Mass. Syngress 2006 1 Online-Ressource (1 volume) txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index Cover; Front Matter; Contents; Chapter 1 What Is There to Worry About?; Chapter 2 Behind the Crime; Chapter 3 State and Local Government Insiders; Chapter 4 Federal Government; Chapter 5 Commercial; Chapter 6 Banking and Financial Sector; Chapter 7 Government Subcontractors; Chapter 8 Profiles of the Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter 10 Survivability; Index Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats Computer networks / Security measures Commercial crimes Computer security Computer hackers COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Data protection Hackers Ring, Sandra Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588 Aggregator Volltext |
spellingShingle | Cole, Eric Insider threat protecting the enterprise from sabotage, spying, and theft Computer networks / Security measures Commercial crimes Computer security Computer hackers COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Data protection Hackers |
title | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_auth | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_exact_search | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_full | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_fullStr | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_full_unstemmed | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_short | Insider threat |
title_sort | insider threat protecting the enterprise from sabotage spying and theft |
title_sub | protecting the enterprise from sabotage, spying, and theft |
topic | Computer networks / Security measures Commercial crimes Computer security Computer hackers COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Data protection Hackers |
topic_facet | Computer networks / Security measures Commercial crimes Computer security Computer hackers COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks Security measures Data protection Hackers |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149588 |
work_keys_str_mv | AT coleeric insiderthreatprotectingtheenterprisefromsabotagespyingandtheft AT ringsandra insiderthreatprotectingtheenterprisefromsabotagespyingandtheft |