Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Page Copyright Page Dedication Page Contents Preface Acknowledgments Chapter 1. Overview Chapter 2. Insider IT Sabotage Chapter 3. Insider Theft of Intellectual Property Chapter 4. Insider Fraud Chapter 5. Insider Threat Issues in the Software Development Life Cycle Chapter 6. Best Practices for the Prevention and Detection of Insider Threats Chapter 7. Technical Insider Threat Controls Chapter 8. Case Examples Chapter 9. Conclusion and Miscellaneous Issues Appendix A. Insider Threat Center Products and Services Appendix B. Deeper Dive into the Data Appendix C. CyberSecurity Watch Survey Appendix D. Insider Threat Database Structure Appendix E. Insider Threat Training Simulation: MERIT InterActive Appendix F. System Dynamics Background Glossary of Terms References About the Authors Index BackMater Footnotes
Preface Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Appendix A Appendix B Appendix C Appendix D Appendix F Glossary
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion