The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / Dawn Cappelli, Andrew Moore, Randall Trzeciak.
Material type:
Contents:
Chapter 1. Overview (Page-1), Chapter 2. Insider IT Sabotage (Page-23),Chapter 3. Insider Theft of Intellectual Property (Page-61),Chapter 4. Insider Fraud (Page-101),Chapter 5. Insider Threat Issues in the Software Development Life Cycle (Page-129),Chapter 6. Best Practices for the Prevention and Detection of Insider Threats (Page-145),Chapter 7. Technical Insider Threat Controls (Page-215),Chapter 8. Case Examples (Page-241),Chapter 9. Conclusion and Miscellaneous Issues (Page-275).
Item type | Current location | Home library | Shelving location | Call number | Status | Notes | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|---|
![]() |
Military College of Signals (MCS) | Military College of Signals (MCS) | Reference | 658.478, CAP (Browse shelf) | Available | Almirah Fresh No.43 Shelf No.5 | MCS38633 |
Total holds: 0
Chapter 1. Overview (Page-1), Chapter 2. Insider IT Sabotage (Page-23),Chapter 3. Insider Theft of Intellectual Property (Page-61),Chapter 4. Insider Fraud (Page-101),Chapter 5. Insider Threat Issues in the Software Development Life Cycle (Page-129),Chapter 6. Best Practices for the Prevention and Detection of Insider Threats (Page-145),Chapter 7. Technical Insider Threat Controls (Page-215),Chapter 8. Case Examples (Page-241),Chapter 9. Conclusion and Miscellaneous Issues (Page-275).
There are no comments on this title.