Cargando…
The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
Addison-Wesley
2012
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1515487 |
_version_ | 1780928335872786432 |
---|---|
author | Cappelli, Dawn Moore, Andrew Trzeciak, Randall |
author_facet | Cappelli, Dawn Moore, Andrew Trzeciak, Randall |
author_sort | Cappelli, Dawn |
collection | CERN |
id | cern-1515487 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2012 |
publisher | Addison-Wesley |
record_format | invenio |
spelling | cern-15154872021-04-21T23:22:27Zhttp://cds.cern.ch/record/1515487engCappelli, DawnMoore, AndrewTrzeciak, RandallThe CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) Computing and ComputersAddison-Wesleyoai:cds.cern.ch:15154872012 |
spellingShingle | Computing and Computers Cappelli, Dawn Moore, Andrew Trzeciak, Randall The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title | The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_full | The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_fullStr | The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_full_unstemmed | The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_short | The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
title_sort | cert guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1515487 |
work_keys_str_mv | AT cappellidawn thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT mooreandrew thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT trzeciakrandall thecertguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT cappellidawn certguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT mooreandrew certguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud AT trzeciakrandall certguidetoinsiderthreatshowtopreventdetectandrespondtoinformationtechnologycrimestheftsabotagefraud |