Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
| Main Author: | Brancik, Kenneth C. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton
Auerbach Publications
c2008
|
| Subjects: | |
| Online Access: | Table of contents only |
Similar Items
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
by: Nelson, Bill, et al.
Cyberpunk outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
Microsoft Windows security inside out
by: Bott, Ed, et al.
Published: (2003)
by: Bott, Ed, et al.
Published: (2003)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
Computer forensics jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010)
by: Nelson, Bill, et al.
Published: (2010)
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)
by: Philipp, Aaron, et al.
Published: (2010)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Internet fraud casebook the World Wide Web of deceit
by: Wells, Joseph T.
Published: (2010)
by: Wells, Joseph T.
Published: (2010)
Fraud : prevention and detection
by: Huntington, I. K. [ (Ian K.)]
Published: (1992)
by: Huntington, I. K. [ (Ian K.)]
Published: (1992)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
How to detect and prevent business fraud
by: Albrecht, W. Steve
Published: (1982)
by: Albrecht, W. Steve
Published: (1982)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Fraud : the growth industry
by: West, Harry
Published: (1988)
by: West, Harry
Published: (1988)
Computer security
by: Gollmann, Dieter
by: Gollmann, Dieter
Kesedaran keselamatan siber 101 penganalisaan ancaman siber
by: Madihah Mohd Saudi
Published: (2015)
by: Madihah Mohd Saudi
Published: (2015)
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010)
by: Hayden, Lance
Published: (2010)
Malware forensics investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008)
by: Aquilina, James M., et al.
Published: (2008)
Managing the insider threat no dark corners
by: Catrantzos, Nick
Published: (2012)
by: Catrantzos, Nick
Published: (2012)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Computer insecurity risking the system
by: Furnell, Steven
Published: (2005)
by: Furnell, Steven
Published: (2005)
Introduction to computer security
by: Bishop, Matt
Published: (2005)
by: Bishop, Matt
Published: (2005)
Computer and cyber security principles, algorithm, applications, and perspectives
Principles of computer security security+TM and beyond
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
Linux server security hack and defend
by: Binnie, Christopher
Published: (2016)
by: Binnie, Christopher
Published: (2016)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
CSA guide to cloud computing implementing cloud privacy and security
by: Samani, Raj, et al.
Published: (2015)
by: Samani, Raj, et al.
Published: (2015)
Virtual honeypots from botnet tracking to intrusion detection
by: Provos, Niels, et al.
Published: (2008)
by: Provos, Niels, et al.
Published: (2008)
The best of 2600 A hacker odyssey
by: Goldstein, Emmanuel 1959-
Published: (2008)
by: Goldstein, Emmanuel 1959-
Published: (2008)
Computers, ethics & social values
by: Johnson, Deborah G. 1945-, et al.
Published: (1995)
by: Johnson, Deborah G. 1945-, et al.
Published: (1995)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Similar Items
-
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009) -
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012) -
Guide to computer forensics and investigations
by: Nelson, Bill, et al. -
Cyberpunk outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991) -
Microsoft Windows security inside out
by: Bott, Ed, et al.
Published: (2003)