Insider Threats in Cyber Security [recurso electrónico] / edited by Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop.
Tipo de material: TextoSeries Advances in Information Security ; 49Editor: Boston, MA : Springer US, 2010Descripción: XII, 244 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9781441971333Tema(s): Computer science | Computer network architectures | Computer Communication Networks | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Information systems | Computer Science | Systems and Data Security | Computer Communication Networks | Data Encryption | Information Systems Applications (incl.Internet) | Data Structures, Cryptology and Information Theory | Computer Systems Organization and Communication NetworksFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .A25 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 371834-2001 |
Navegando Biblioteca Electrónica Estantes, Código de colección: Colección de Libros Electrónicos Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA76.9 .A25 Security Informatics | QA76.9 .A25 Open Source Software for Digital Forensics | QA76.9 .A25 Economics of Information Security and Privacy | QA76.9 .A25 Insider Threats in Cyber Security | QA76.9 .A25 Preserving Privacy in Data Outsourcing | QA76.9 .A25 Voice over IP Security | QA76.9 .A25 Moving Target Defense |
Aspects of Insider Threats -- Combatting Insider Threats -- Insider Threat and Information Security Management -- A State of the Art Survey of Fraud Detection Technology -- Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation -- A Risk Management Approach to the “Insider Threat” -- Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection -- Towards an Access-Control Framework for Countering Insider Threats -- Monitoring Technologies for Mitigating Insider Threats -- Insider Threat Specification as a Threat Mitigation Technique.
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I’ll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.
19