Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication Page
Contents
Preface
Acknowledgments
Chapter 1. Overview
Chapter 2. Insider IT Sabotage
Chapter 3. Insider Theft of Intellectual Property
Chapter 4. Insider Fraud
Chapter 5. Insider Threat Issues in the Software Development Life Cycle
Chapter 6. Best Practices for the Prevention and Detection of Insider Threats
Chapter 7. Technical Insider Threat Controls
Chapter 8. Case Examples
Chapter 9. Conclusion and Miscellaneous Issues
Appendix A. Insider Threat Center Products and Services
Appendix B. Deeper Dive into the Data
Appendix C. CyberSecurity Watch Survey
Appendix D. Insider Threat Database Structure
Appendix E. Insider Threat Training Simulation: MERIT InterActive
Appendix F. System Dynamics Background
Glossary of Terms
References
About the Authors
Index
BackMater
Footnotes
Preface
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Appendix A
Appendix B
Appendix C
Appendix D
Appendix F
Glossary
← Prev
Back
Next →
← Prev
Back
Next →