Insider threat protecting the enterprise from sabotage, spying, and theft

Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to ana...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Cole, Eric (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, Mass. Oxford Syngress Elsevier Science [distributor] 2006
Schlagworte:
Online-Zugang:FLA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV046124441
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 190827s2006 |||| o||u| ||||||eng d
020 |a 1423754999  |9 1-4237-5499-9 
020 |a 9781423754992  |9 978-1-4237-5499-2 
020 |a 9780080489056  |9 978-0-08-048905-6 
020 |a 0080489052  |9 0-08-048905-2 
020 |a 1597490482  |9 1-59749-048-2 
020 |a 9781597490481  |9 978-1-59749-048-1 
024 3 |a 9781597490481 
035 |a (ZDB-33-ESD)ocm64175752 
035 |a (OCoLC)64175752 
035 |a (DE-599)BVBBV046124441 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 005.8  |2 22 
100 1 |a Cole, Eric  |e Verfasser  |4 aut 
245 1 0 |a Insider threat  |b protecting the enterprise from sabotage, spying, and theft  |c Eric Cole, Sandra Ring 
264 1 |a Rockland, Mass.  |a Oxford  |b Syngress  |b Elsevier Science [distributor]  |c 2006 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Hackers  |2 fast 
650 4 |a Computer networks  |x Security measures 
650 4 |a Data protection 
650 4 |a Computer security 
650 4 |a Hackers 
700 1 |a Ring, Sandra  |e Sonstige  |4 oth 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1281035661 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1597490482 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781281035660 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781597490481 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597490481  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-33-ESD 
999 |a oai:aleph.bib-bvb.de:BVB01-031504895 
966 e |u http://www.sciencedirect.com/science/book/9781597490481  |l FLA01  |p ZDB-33-ESD  |q FLA_PDA_ESD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1804180442473037824
any_adam_object
author Cole, Eric
author_facet Cole, Eric
author_role aut
author_sort Cole, Eric
author_variant e c ec
building Verbundindex
bvnumber BV046124441
collection ZDB-33-ESD
ctrlnum (ZDB-33-ESD)ocm64175752
(OCoLC)64175752
(DE-599)BVBBV046124441
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02595nmm a2200589zc 4500</leader><controlfield tag="001">BV046124441</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754999</subfield><subfield code="9">1-4237-5499-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754992</subfield><subfield code="9">978-1-4237-5499-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489056</subfield><subfield code="9">978-0-08-048905-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489052</subfield><subfield code="9">0-08-048905-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490482</subfield><subfield code="9">1-59749-048-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490481</subfield><subfield code="9">978-1-59749-048-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781597490481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm64175752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64175752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124441</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Insider threat</subfield><subfield code="b">protecting the enterprise from sabotage, spying, and theft</subfield><subfield code="c">Eric Cole, Sandra Ring</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ring, Sandra</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1281035661</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490482</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781281035660</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597490481</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490481</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504895</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490481</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV046124441
illustrated Illustrated
indexdate 2024-07-10T08:35:50Z
institution BVB
isbn 1423754999
9781423754992
9780080489056
0080489052
1597490482
9781597490481
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031504895
oclc_num 64175752
open_access_boolean
physical 1 online resource (1 volume) illustrations
psigel ZDB-33-ESD
ZDB-33-ESD FLA_PDA_ESD
publishDate 2006
publishDateSearch 2006
publishDateSort 2006
publisher Syngress Elsevier Science [distributor]
record_format marc
spelling Cole, Eric Verfasser aut
Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring
Rockland, Mass. Oxford Syngress Elsevier Science [distributor] 2006
1 online resource (1 volume) illustrations
txt rdacontent
c rdamedia
cr rdacarrier
Includes bibliographical references and index
Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Data protection fast
Hackers fast
Computer networks Security measures
Data protection
Computer security
Hackers
Ring, Sandra Sonstige oth
Erscheint auch als Druck-Ausgabe 1281035661
Erscheint auch als Druck-Ausgabe 1597490482
Erscheint auch als Druck-Ausgabe 9781281035660
Erscheint auch als Druck-Ausgabe 9781597490481
http://www.sciencedirect.com/science/book/9781597490481 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Cole, Eric
Insider threat protecting the enterprise from sabotage, spying, and theft
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Data protection fast
Hackers fast
Computer networks Security measures
Data protection
Computer security
Hackers
title Insider threat protecting the enterprise from sabotage, spying, and theft
title_auth Insider threat protecting the enterprise from sabotage, spying, and theft
title_exact_search Insider threat protecting the enterprise from sabotage, spying, and theft
title_full Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring
title_fullStr Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring
title_full_unstemmed Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring
title_short Insider threat
title_sort insider threat protecting the enterprise from sabotage spying and theft
title_sub protecting the enterprise from sabotage, spying, and theft
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Data protection fast
Hackers fast
Computer networks Security measures
Data protection
Computer security
Hackers
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Computer networks / Security measures
Computer security
Data protection
Hackers
Computer networks Security measures
url http://www.sciencedirect.com/science/book/9781597490481
work_keys_str_mv AT coleeric insiderthreatprotectingtheenterprisefromsabotagespyingandtheft
AT ringsandra insiderthreatprotectingtheenterprisefromsabotagespyingandtheft