Listing 1 - 2 of 2 |
Sort by
|
Choose an application
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like
Commercial crimes. --- Computer hackers. --- Computer networks --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer hackers --- Corporate crime --- Crimes, Financial --- Financial crimes --- Offenses affecting the public trade --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer security --- Computer programmers --- Computer users --- Crime --- Information Technology --- General and Others
Choose an application
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like
Computer. Automation --- Commercial crimes. --- Computer hackers. --- Computer networks --- Computer security. --- Security measures. --- Hackers. --- Information Technology --- General and Others
Listing 1 - 2 of 2 |
Sort by
|