SFr. 79.00
€ 79.00
BTC 0.0094
LTC 0.597
ETH 0.1124


bestellen

Artikel-Nr. 12292708


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:




Autor(en): 
  • Dawn M. Cappelli
  • Andrew P. Moore
  • Randall F. Trzeciak
  • The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 3 Artikel!


    Übersicht
     
    Lieferstatus:   i.d.R. innert 14-24 Tagen versandfertig
    Veröffentlichung:  Februar 2012  
    Genre:  Wirtschaft / Recht 
    ISBN:  9780321812575 
    EAN-Code: 
    9780321812575 
    Verlag:  Pearson Education (US) 
    Einband:  Gebunden  
    Sprache:  English  
    Dimensionen:  H 239 mm / B 179 mm / D 29 mm 
    Gewicht:  812 gr 
    Seiten:  432 
    Illustration:  Illustrations 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    Wikileaks recent data exposures demonstrate the danger now posed by insiders, who can often bypass physical and technical security measures designed to prevent unauthorized access. Insiders are already familiar with their organizations' policies, procedures, and technologies, and can often identify vulnerabilities more effectively than outside "hackers." Most IT security mechanisms are implemented primarily to defend against external threats, leaving potentially enormous vulnerabilities exposed. Now, the insider threat team at CERT, the world's leading information security experts, helps readers systematically identify, prevent, detect, and mitigate threats arising from inside the organization. Drawing on their advanced research with the US Secret Service and Department of Defense, as well as the world's largest database of insider attacks, the authors systematically address four key types of insider "cybercrime": national security espionage, IT sabotage, theft of intellectual property, and fraud. For each, they present an up-to-date crime profile: who typically commits these crimes (and why); relevant organizational issues; methods of attack, impacts, and precursors that could have warned the organization in advance. In addition to describing patterns that readers can use in their own organizations, the authors offer today's most effective psychological, technical, organizational, cultural, and process-based countermeasures.

      



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Google Plus-Page Google+ | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2018
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2018
    Jetzt auch mit Ethereum bestellen!