000 02039cam a22003974a 4500
001 17110096
003 NUST
005 20220722110256.0
008 120109s2012 njua b 001 0 eng
010 _a 2011047338
016 7 _a015946764
_2Uk
020 _a9780321812575 (hbk. : alk. paper)
020 _a0321812573 (hbk. : alk. paper)
035 _a(OCoLC)ocn752067994
040 _aDLC
_cDLC
_dYDX
_dBTCTA
_dUKMGB
_dYDXCP
_dBWX
_dCDX
_dDLC
042 _apcc
050 0 0 _aHV6773
_b.C33 2012
082 0 0 _a658.478, CAP
_223
100 1 _aCappelli, Dawn.
_994512
245 1 4 _aThe CERT guide to insider threats :
_bhow to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
_cDawn Cappelli, Andrew Moore, Randall Trzeciak.
260 _aUpper Saddle River, NJ :
_bAddison-Wesley,
_cc2012.
300 _axxxv, 389 p. :
_bill. ;
_c24 cm.
490 1 _aThe Sei series in software engineering
505 _aChapter 1. Overview (Page-1), Chapter 2. Insider IT Sabotage (Page-23),Chapter 3. Insider Theft of Intellectual Property (Page-61),Chapter 4. Insider Fraud (Page-101),Chapter 5. Insider Threat Issues in the Software Development Life Cycle (Page-129),Chapter 6. Best Practices for the Prevention and Detection of Insider Threats (Page-145),Chapter 7. Technical Insider Threat Controls (Page-215),Chapter 8. Case Examples (Page-241),Chapter 9. Conclusion and Miscellaneous Issues (Page-275).
650 0 _aComputer crimes
_xPrevention.
_994102
650 0 _aEmployee crimes
_xPrevention.
_994513
650 0 _aInformation technology
_xSecurity measures.
_9759
650 0 _aComputer networks
_xSecurity measures.
_9466
650 0 _aData protection.
_96081
700 1 _aMoore, Andrew.
_994514
700 1 _aTrzeciak, Randall.
_994515
830 0 _aSEI series in software engineering.
_994516
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c590512
_d590512