Insider threat: protecting the enterprise from sabotage, spying, and theft
Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to ana...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Rockland, Mass. Oxford
Syngress ;
2006
Rockland, Mass. Oxford Elsevier Science [distributor] 2006 |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781597490481/?ar |
Summary: | Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats. |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 9786611035662 6611035664 1597490938 9781597490931 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-05169476X | ||
003 | DE-627-1 | ||
005 | 20240228114001.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2006 xx |||||o 00| ||eng c | ||
020 | |a 1423754999 |c electronic bk. |9 1-4237-5499-9 | ||
020 | |a 9781423754992 |c electronic bk. |9 978-1-4237-5499-2 | ||
020 | |a 9780080489056 |c electronic bk. |9 978-0-08-048905-6 | ||
020 | |a 0080489052 |c electronic bk. |9 0-08-048905-2 | ||
020 | |a 1597490482 |9 1-59749-048-2 | ||
020 | |a 9781597490481 |9 978-1-59749-048-1 | ||
020 | |a 9786611035662 |9 9786611035662 | ||
020 | |a 6611035664 |9 6611035664 | ||
020 | |a 1597490938 |9 1-59749-093-8 | ||
020 | |a 9781597490931 |9 978-1-59749-093-1 | ||
020 | |a 9781597490481 |9 978-1-59749-048-1 | ||
035 | |a (DE-627-1)05169476X | ||
035 | |a (DE-599)KEP05169476X | ||
035 | |a (ORHE)9781597490481 | ||
035 | |a (DE-627-1)05169476X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a KM |2 bicssc | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cole, Eric |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Insider threat |b protecting the enterprise from sabotage, spying, and theft |c Eric Cole, Sandra Ring |
264 | 1 | |a Rockland, Mass. |a Oxford |b Syngress ; |c 2006 | |
264 | 1 | |a Rockland, Mass. |a Oxford |b Elsevier Science [distributor] |c 2006 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Data protection | |
650 | 0 | |a Computer security | |
650 | 0 | |a Hackers | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Hackers | |
700 | 1 | |a Ring, Sandra |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597490482 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597490482 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597490481/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-05169476X |
---|---|
_version_ | 1829007754457513984 |
adam_text | |
any_adam_object | |
author | Cole, Eric |
author2 | Ring, Sandra |
author2_role | ctb |
author2_variant | s r sr |
author_facet | Cole, Eric Ring, Sandra |
author_role | aut |
author_sort | Cole, Eric |
author_variant | e c ec |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)05169476X (DE-599)KEP05169476X (ORHE)9781597490481 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03007cam a22007452c 4500</leader><controlfield tag="001">ZDB-30-ORH-05169476X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114001.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2006 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754999</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-5499-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754992</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-5499-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489056</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-048905-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489052</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-048905-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490482</subfield><subfield code="9">1-59749-048-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490481</subfield><subfield code="9">978-1-59749-048-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035662</subfield><subfield code="9">9786611035662</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611035664</subfield><subfield code="9">6611035664</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490938</subfield><subfield code="9">1-59749-093-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490931</subfield><subfield code="9">978-1-59749-093-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490481</subfield><subfield code="9">978-1-59749-048-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)05169476X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP05169476X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597490481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)05169476X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">KM</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Insider threat</subfield><subfield code="b">protecting the enterprise from sabotage, spying, and theft</subfield><subfield code="c">Eric Cole, Sandra Ring</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress ;</subfield><subfield code="c">2006</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ring, Sandra</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597490482</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490482</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597490481/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-05169476X |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:19Z |
institution | BVB |
isbn | 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 9786611035662 6611035664 1597490938 9781597490931 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress ; Elsevier Science [distributor] |
record_format | marc |
spelling | Cole, Eric VerfasserIn aut Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring Rockland, Mass. Oxford Syngress ; 2006 Rockland, Mass. Oxford Elsevier Science [distributor] 2006 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats. English. Computer networks Security measures Data protection Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Ring, Sandra MitwirkendeR ctb 1597490482 Erscheint auch als Druck-Ausgabe 1597490482 |
spellingShingle | Cole, Eric Insider threat protecting the enterprise from sabotage, spying, and theft Computer networks Security measures Data protection Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_auth | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_exact_search | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_full | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_fullStr | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_full_unstemmed | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_short | Insider threat |
title_sort | insider threat protecting the enterprise from sabotage spying and theft |
title_sub | protecting the enterprise from sabotage, spying, and theft |
topic | Computer networks Security measures Data protection Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer networks Security measures Data protection Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT coleeric insiderthreatprotectingtheenterprisefromsabotagespyingandtheft AT ringsandra insiderthreatprotectingtheenterprisefromsabotagespyingandtheft |