Narrow your search

Library

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

UGent (2)

Vlerick Business School (2)

VIVES (2)

UAntwerpen (1)

More...

Resource type

book (2)

digital (1)


Language

English (2)


Year
From To Submit

2006 (2)

Listing 1 - 2 of 2
Sort by
Insider threat : protecting the enterprise from sabotage, spying, and theft
Authors: ---
ISBN: 1281035661 9786611035662 0080489052 1597490938 1597490482 1423754999 9781423754992 9780080489056 9781597490481 9781597490481 9781281035660 Year: 2006 Publisher: Rockland, Mass. : [S.l.] : Syngress ; Distributed by O'Reilly Media,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like

Insider threat : protecting the enterprise from sabotage, spying, and theft
Authors: ---
ISBN: 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 1281035661 9781281035660 9786611035662 6611035664 1597490938 9781597490931 Year: 2006 Publisher: Rockland, Mass. : [S.l.] : Syngress ; Distributed by O'Reilly Media,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like

Listing 1 - 2 of 2
Sort by