Image from Google Jackets

The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / Dawn Cappelli, Andrew Moore, Randall Trzeciak.

By: Cappelli, Dawn MContributor(s): Moore, Andrew P | Trzeciak, Randall FMaterial type: TextTextPublication details: Upper Saddle River, N.J. ; London : Addison-Wesley, 2012Description: xxxv, 389 p. ; 24 cmISBN: 9780321812575 (hbk.) :; 0321812573 (hbk.) :Subject(s): Computer securityDDC classification: 005.8 Summary: Wikileaks recent data exposures demonstrate the danger now posed by insiders, who can often bypass physical and technical security measures designed to prevent unauthorized access. The insider threat team at CERT helps readers systematically identify, prevent, detect, and mitigate threats.

Wikileaks recent data exposures demonstrate the danger now posed by insiders, who can often bypass physical and technical security measures designed to prevent unauthorized access. The insider threat team at CERT helps readers systematically identify, prevent, detect, and mitigate threats.

Specialized.

There are no comments on this title.

to post a comment.