Insider threat protecting the enterprise from sabotage, spying, and theft
Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to ana...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. Oxford
Syngress Elsevier Science [distributor]
2006
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124441 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2006 |||| o||u| ||||||eng d | ||
020 | |a 1423754999 |9 1-4237-5499-9 | ||
020 | |a 9781423754992 |9 978-1-4237-5499-2 | ||
020 | |a 9780080489056 |9 978-0-08-048905-6 | ||
020 | |a 0080489052 |9 0-08-048905-2 | ||
020 | |a 1597490482 |9 1-59749-048-2 | ||
020 | |a 9781597490481 |9 978-1-59749-048-1 | ||
024 | 3 | |a 9781597490481 | |
035 | |a (ZDB-33-ESD)ocm64175752 | ||
035 | |a (OCoLC)64175752 | ||
035 | |a (DE-599)BVBBV046124441 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cole, Eric |e Verfasser |4 aut | |
245 | 1 | 0 | |a Insider threat |b protecting the enterprise from sabotage, spying, and theft |c Eric Cole, Sandra Ring |
264 | 1 | |a Rockland, Mass. |a Oxford |b Syngress |b Elsevier Science [distributor] |c 2006 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
700 | 1 | |a Ring, Sandra |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1281035661 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597490482 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781281035660 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597490481 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490481 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504895 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597490481 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442473037824 |
---|---|
any_adam_object | |
author | Cole, Eric |
author_facet | Cole, Eric |
author_role | aut |
author_sort | Cole, Eric |
author_variant | e c ec |
building | Verbundindex |
bvnumber | BV046124441 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm64175752 (OCoLC)64175752 (DE-599)BVBBV046124441 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02595nmm a2200589zc 4500</leader><controlfield tag="001">BV046124441</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754999</subfield><subfield code="9">1-4237-5499-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754992</subfield><subfield code="9">978-1-4237-5499-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489056</subfield><subfield code="9">978-0-08-048905-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489052</subfield><subfield code="9">0-08-048905-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490482</subfield><subfield code="9">1-59749-048-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490481</subfield><subfield code="9">978-1-59749-048-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781597490481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm64175752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64175752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124441</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Insider threat</subfield><subfield code="b">protecting the enterprise from sabotage, spying, and theft</subfield><subfield code="c">Eric Cole, Sandra Ring</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ring, Sandra</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1281035661</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490482</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781281035660</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597490481</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490481</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504895</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490481</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124441 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504895 |
oclc_num | 64175752 |
open_access_boolean | |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Elsevier Science [distributor] |
record_format | marc |
spelling | Cole, Eric Verfasser aut Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring Rockland, Mass. Oxford Syngress Elsevier Science [distributor] 2006 1 online resource (1 volume) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Teaches IT professionals and law enforcement officials about the dangers posed by insiders to their IT infrastructure, and how to mitigate these risks by designing and implementing secure IT systems, as well as security and human resource policies. The authors use their backgrounds in the CIA to analyze several cases involving insider threats COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data protection fast Hackers fast Computer networks Security measures Data protection Computer security Hackers Ring, Sandra Sonstige oth Erscheint auch als Druck-Ausgabe 1281035661 Erscheint auch als Druck-Ausgabe 1597490482 Erscheint auch als Druck-Ausgabe 9781281035660 Erscheint auch als Druck-Ausgabe 9781597490481 http://www.sciencedirect.com/science/book/9781597490481 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cole, Eric Insider threat protecting the enterprise from sabotage, spying, and theft COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data protection fast Hackers fast Computer networks Security measures Data protection Computer security Hackers |
title | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_auth | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_exact_search | Insider threat protecting the enterprise from sabotage, spying, and theft |
title_full | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_fullStr | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_full_unstemmed | Insider threat protecting the enterprise from sabotage, spying, and theft Eric Cole, Sandra Ring |
title_short | Insider threat |
title_sort | insider threat protecting the enterprise from sabotage spying and theft |
title_sub | protecting the enterprise from sabotage, spying, and theft |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Data protection fast Hackers fast Computer networks Security measures Data protection Computer security Hackers |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Data protection Hackers Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597490481 |
work_keys_str_mv | AT coleeric insiderthreatprotectingtheenterprisefromsabotagespyingandtheft AT ringsandra insiderthreatprotectingtheenterprisefromsabotagespyingandtheft |