Verzending: Op voorraad. Voor 23:59 uur besteld, woensdag in huis
Virussen hoaxes Trojaanse paarden wormen spam cookies spyware dialers... Deze en vele andere ongemakken houden miljoenen computergebruikers dagelijks bezig. Met de schijnbaar onophoudelijke groei van het aantal mogelijkheden neemt ook de zorg om beveiliging van... Lees meer.
This textbook analyses the origins and effects of insider risk using multiple real-life case histories to illustrate the principles and explains how to protect organisations against the risk. This textbook analyses the origins and effects of insider risk using mu... Lees meer.
Insider Threat A Guide to Understanding Detecting and Defending Against the Enemy from Within looks beyond perimeter protection tools and shows how a security culture based on international best practice can help mitigate the insider threat to your security. Ev... Lees meer.
Since 2001 the CERT Insider Threat Center at Carnegie Mellon University s Software Engineering Institute SEI has collected and analyzed information about more than seven hundred insider cyber crimes ranging from national security espionage to theft of trade secrets... Lees meer.
Land the perfect cybersecurity role and move up the ladder with this insightful resource Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security te... Lees meer.
Managing the Insider Threat. No Dark Corners and the Rising Tide Menace Second Edition follows up on the success of and insight provided by the first edition reframing the insider threat by distinguishing between sudden impact and slow onset aka rising tide inside... Lees meer.
Every type of organisation is vulnerable to insider abuse errors and malicious attacks. grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees contractors or other business partners who have been... Lees meer.
Employees know a company s computer system better than anyone and have access to important information about the company and its customers. This access makes greedy or disgruntled employees to sabotage a system or to sell privileged information. This book presents safeg... Lees meer.
Managing the Insider Threat. No Dark Corners and the Rising Tide Menace Second Edition follows up on the success of and insight provided by the first edition reframing the insider threat by distinguishing between sudden impact and slow onset aka rising tide inside... Lees meer.
This textbook analyses the origins and effects of insider risk using multiple real-life case histories to illustrate the principles and explains how to protect organisations against the risk. This textbook analyses the origins and effects of insider risk using mu... Lees meer.
Antivirus software uses algorithms to detect viruses Reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools the types of malware the tools will detect implementation of the tools... Lees meer.
Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community corporate investigations and law enforcement to this work on insider risk. After a career in counterterro... Lees meer.
Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure but to stay that way it i... Lees meer.