Books on the topic 'Insider threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Insider threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Godse, Vinayak. The threat within: A study on insider threat by DSCI in collaboration with PwC. Data Security Council of India, 2011.
Find full text1954-, Hoffman Bruce, United States. Dept. of Energy., and Rand Corporation, eds. Insider crime: The threat to nuclear facilities and programs. Rand Corp., 1990.
Find full text1939-, Anderson Robert H., United States. Advanced Research and Development Activity, and Rand Corporation, eds. Understanding the insider threat: Proceedings of a March 2004 workshop. RAND, 2004.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Examining insider threat risk at the U.S.Citizenship and Immigration Services. U.S. Dept. of Homeland Security, Office of Inspector General, 2011.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Transportation Security Administration has taken steps to address the insider threat but challenges remain (redacted). Department of Homeland Security, Office of Inspector General, 2012.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. U.S. Customs and Border Protection has taken steps to address insider threat, but challenges remain (redacted). Department of Homeland Security, Office of Inspector General, 2013.
Find full textCarneiro, Anabela. Market power, dismissal threat and rent sharing: The role of insider and outsider forces in wage bargaining. IZA, 2006.
Find full textOcasio, William. Failure-induced change and threat-rigidity under economic adversity: The case of insider vs. outsider CEO succession. Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1993.
Find full text1939-, Anderson Robert H., and National Defense Research Institute (U.S.), eds. Research on mitigating the insider threat to information systems--#2: Proceedings of a workshop held August, 2000. RAND, 2000.
Find full textArduin, Pierre-Emmanuel. Insider Threats. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.
Full textBertino, Elisa. Data Protection from Insider Threats. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-01890-9.
Full textThompson, Eleanor E. The Insider Threat. Auerbach Publications, 2018. http://dx.doi.org/10.1201/9781315368627.
Full textCatrantzos, Nick. Managing the Insider Threat. CRC Press, 2012. http://dx.doi.org/10.1201/b12063.
Full textMelton, Marliss. Insider Threat: Military Romantic Suspense. ePublishing Works!, 2022.
Find full textCybersecurity and Infrastructure Security Agency. Insider Threat Mitigation Guide : Defining, Detecting, Assesing, and Managing Insider Threats: Cybersecurity and Infrastructure Security Agency. Independently Published, 2022.
Find full textThompson, Eleanor E. Insider Threat: Assessment and Mitigation of Risks. Taylor & Francis Group, 2018.
Find full textThompson, Eleanor E. Insider Threat: Assessment and Mitigation of Risks. Auerbach Publishers, Incorporated, 2018.
Find full textMelton, Marliss. Insider Threat: Deep Cover Series, Book 1. James-York Press, 2021.
Find full textCatrantzos, Nick. Managing the Insider Threat: No Dark Corners. Taylor & Francis Group, 2012.
Find full textGelles, Michael G. Insider Threat: Prevention, Detection, Mitigation, and Deterrence. Elsevier Science & Technology Books, 2016.
Find full textMelton, Marliss. Insider Threat: Book 1, Deep Cover Series. James-York Press, 2021.
Find full textThompson, Eleanor E. Insider Threat: Assessment and Mitigation of Risks. Auerbach Publishers, Incorporated, 2018.
Find full textThompson, Eleanor E. Insider Threat: Assessment and Mitigation of Risks. Auerbach Publishers, Incorporated, 2018.
Find full textCatrantzos, Nick. Managing the Insider Threat: No Dark Corners. Taylor & Francis Group, 2012.
Find full textCatrantzos, Nick. Managing the Insider Threat: No Dark Corners. Taylor & Francis Group, 2012.
Find full textCatrantzos, Nick. Managing the Insider Threat: No Dark Corners. Taylor & Francis Group, 2012.
Find full textJames, Turner, and Michael G. Gelles. Insider Threat: Detection, Mitigation, Deterrence and Prevention. Elsevier Science & Technology Books, 2016.
Find full textThompson, Eleanor E. Insider Threat: Assessment and Mitigation of Risks. Auerbach Publishers, Incorporated, 2018.
Find full textCatrantzos, Nick. Managing the Insider Threat: No Dark Corners. Taylor & Francis Group, 2012.
Find full textJames, Scott. In 2017, the Insider Threat Epidemic Begins. Independently Published, 2019.
Find full textMelton, Marliss. Insider Threat (the Echo Platoon Series, Book 4). ePublishing Works!, 2022.
Find full textBlokdyk, Gerardus. Cyber Insider Threat a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textBlokdyk, Gerardus. Insider Threat Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textThuraisingham, Bhavani, Latifur Khan, Pallabi Parveen, and Mohammad Mehedy Masud. Big Data Analytics with Applications in Insider Threat Detection. Auerbach Publishers, Incorporated, 2017.
Find full textThuraisingham, Bhavani, Latifur Khan, Pallabi Parveen, and Mohammad Mehedy Masud. Big Data Analytics with Applications in Insider Threat Detection. Auerbach Publishers, Incorporated, 2017.
Find full textThuraisingham, Bhavani M., Latifur Khan, Pallabi Parveen, and Mohammad Mehedy Masud. Big Data Analytics with Applications in Insider Threat Detection. Taylor & Francis Group, 2020.
Find full text