Managing the insider threat no dark corners
| Main Author: | Catrantzos, Nick (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press
c2012
|
| Subjects: |
Similar Items
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Fraud smart
by: Pickett, K. H. Spencer
Published: (2012)
by: Pickett, K. H. Spencer
Published: (2012)
Keganasan di tempat kerja .
by: Chappell, Duncan, et al.
Published: (2003)
by: Chappell, Duncan, et al.
Published: (2003)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Cegah jenayah pencegahan jenayah syariah
by: Zulkifli Mohamad al-Bakri 1969-
Published: (2014)
by: Zulkifli Mohamad al-Bakri 1969-
Published: (2014)
Security an introduction
by: Purpura, Philip P. 1950-
Published: (2011)
by: Purpura, Philip P. 1950-
Published: (2011)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Security leader insights for effective management lessons and strategies from leading security professionals
Published: (2014)
Published: (2014)
Security convergence managing enterprise security risk
by: Tyson, Dave
Published: (2007)
by: Tyson, Dave
Published: (2007)
الارهاب وتشريعات المكافحة في الدول الديمقراطية
by: غنام, محمد ابو الفتح
Published: (1991)
by: غنام, محمد ابو الفتح
Published: (1991)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Crime prevention approaches, practices and evaluations
by: Lab, Steven P.
Published: (2016)
by: Lab, Steven P.
Published: (2016)
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010)
by: Hayden, Lance
Published: (2010)
Retail security and loss prevention solutions
by: Greggo, Alan, et al.
Published: (2011)
by: Greggo, Alan, et al.
Published: (2011)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Crime prevention a critical introduction
by: Evans, Karen 1961-
Published: (2011)
by: Evans, Karen 1961-
Published: (2011)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Kesedaran punca utama membenteras rasuah
Transportation security against terrorism
by: Ozen, Cinar, et al.
Published: (2009)
by: Ozen, Cinar, et al.
Published: (2009)
Countering fraud for competitive advantage the professional approach to reducing the last great hidden cost
by: Button, Mark 1969-, et al.
Published: (2013)
by: Button, Mark 1969-, et al.
Published: (2013)
Cybercrime and society
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Managing the risk of fraud and misconduct [ meeting the challenges of a global, regulated and digital environment
by: Girgenti, Richard H., et al.
Published: (2011)
by: Girgenti, Richard H., et al.
Published: (2011)
Risk management & derivatives
by: Stulz, Rene M.
Published: (2003)
by: Stulz, Rene M.
Published: (2003)
International handbook of criminology
by: Kett, Martin 1967-, et al.
Published: (2010)
by: Kett, Martin 1967-, et al.
Published: (2010)
السياسة الجنائية دراسة مقارنة
by: ابراهيم، اكرم نشات
Published: (2011)
by: ابراهيم، اكرم نشات
Published: (2011)
Risk management
by: Das, Satyajit
Published: (2006)
by: Das, Satyajit
Published: (2006)
Kesedaran keselamatan siber 101 penganalisaan ancaman siber
by: Madihah Mohd Saudi
Published: (2015)
by: Madihah Mohd Saudi
Published: (2015)
Foreign corrupt practices act compliance guidebook protecting your organization from bribery and corruption
by: Biegelman, Martin T., et al.
Published: (2010)
by: Biegelman, Martin T., et al.
Published: (2010)
Corporate risk management : a financial exposition
by: Doherty, Neil A.
Published: (1985)
by: Doherty, Neil A.
Published: (1985)
The handbook of risk management implementing a post crisis corporate culture
by: Carrel, Philippe
Published: (2010)
by: Carrel, Philippe
Published: (2010)
The library security and safety guide to prevention, planning, and response
by: Kahn, Miriam (Miriam B.)
Published: (2008)
by: Kahn, Miriam (Miriam B.)
Published: (2008)
Security leader insights for risk management lessons and strategies from leading security professionals
Published: (2015)
Published: (2015)
Strategic thinking in criminal intelligence
by: Ratcliffe, Jerry
Published: (2009)
by: Ratcliffe, Jerry
Published: (2009)
Organised crime and the law a comparative analysis
by: Campbell, Liz
Published: (2013)
by: Campbell, Liz
Published: (2013)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
Corporate risk management
by: Merna, Tony, et al.
Published: (2008)
by: Merna, Tony, et al.
Published: (2008)
Corporate risk management an organisational perspective
by: Merna, Tony, et al.
Published: (2005)
by: Merna, Tony, et al.
Published: (2005)
Food safety a roadmap to success
by: Ades, Garye, et al.
Published: (2016)
by: Ades, Garye, et al.
Published: (2016)
Similar Items
-
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012) -
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013) -
Fraud smart
by: Pickett, K. H. Spencer
Published: (2012) -
Keganasan di tempat kerja .
by: Chappell, Duncan, et al.
Published: (2003) -
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)