The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
| Main Authors: | Cappelli, Dawn (Author), Moore, Andrew (Author), Trzeciak, Randall (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Upper Saddle River, New Jersey
Addison-Wesley
c2012
|
| Series: | The Sei series in software engineering
|
| Subjects: |
Similar Items
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
Managing the insider threat no dark corners
by: Catrantzos, Nick
Published: (2012)
by: Catrantzos, Nick
Published: (2012)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998)
by: Janal, Daniel S.
Published: (1998)
Cybercrime and society
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
A machine learning approach to phishing detection and defense
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010)
by: Hayden, Lance
Published: (2010)
Profiling hackers the science of criminal profiling as applied to the world of hacking
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Internet fraud casebook the World Wide Web of deceit
by: Wells, Joseph T.
Published: (2010)
by: Wells, Joseph T.
Published: (2010)
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
Kesedaran keselamatan siber 101 penganalisaan ancaman siber
by: Madihah Mohd Saudi
Published: (2015)
by: Madihah Mohd Saudi
Published: (2015)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
الجرائم الدولية للانترنت
by: يوسف، يوسف حسن
Published: (2011)
by: يوسف، يوسف حسن
Published: (2011)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Security an introduction
by: Purpura, Philip P. 1950-
Published: (2011)
by: Purpura, Philip P. 1950-
Published: (2011)
Legal framework affecting cybercrimes in Yemen with special reference to Malaysia
by: Mohammed, Ammar Abdullah Saeed
by: Mohammed, Ammar Abdullah Saeed
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
Crime prevention approaches, practices and evaluations
by: Lab, Steven P.
Published: (2016)
by: Lab, Steven P.
Published: (2016)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
How to detect and prevent business fraud
by: Albrecht, W. Steve
Published: (1982)
by: Albrecht, W. Steve
Published: (1982)
Retail security and loss prevention solutions
by: Greggo, Alan, et al.
Published: (2011)
by: Greggo, Alan, et al.
Published: (2011)
Crime prevention a critical introduction
by: Evans, Karen 1961-
Published: (2011)
by: Evans, Karen 1961-
Published: (2011)
Managerial guide for handling cyber-terrorism and information warfare
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
Computer forensics jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
Cegah jenayah pencegahan jenayah syariah
by: Zulkifli Mohamad al-Bakri 1969-
Published: (2014)
by: Zulkifli Mohamad al-Bakri 1969-
Published: (2014)
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
Cyberpunk outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
Hacking exposed 6 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Hacking exposed network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Wireless security models, threats and solutions
by: Nichols, Randall K., et al.
Published: (2002)
by: Nichols, Randall K., et al.
Published: (2002)
Similar Items
-
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010) -
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013) -
Managing the insider threat no dark corners
by: Catrantzos, Nick
Published: (2012) -
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015) -
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998)