Books on the topic 'Insider threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Insider threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Arduin, Pierre-Emmanuel. Insider Threats. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.
Full textBertino, Elisa. Data Protection from Insider Threats. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-01890-9.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Full textContos, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Elsevier, 2009.
Find full textAndrew, Moore, and Trzeciak Randall, eds. The CERT guide to insider threats: How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). Addison-Wesley, 2012.
Find full textElam, Jason. Inside threat: A Riley Covington thriller. Tyndale House Publishers, 2011.
Find full textGodse, Vinayak. The threat within: A study on insider threat by DSCI in collaboration with PwC. Data Security Council of India, 2011.
Find full text1954-, Hoffman Bruce, United States. Dept. of Energy., and Rand Corporation, eds. Insider crime: The threat to nuclear facilities and programs. Rand Corp., 1990.
Find full textBunn, Matthew, and Scott D. Sagan, eds. Insider Threats. Cornell University Press, 2017. http://dx.doi.org/10.7591/9781501705946.
Full textSagan, Scott Douglas, and Matthew Bunn. Insider Threats. Cornell University Press, 2017.
Find full textArduin, Pierre-Emmanuel, and Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Find full textBertino, Elisa. Data Protection from Insider Threats. Morgan & Claypool Publishers, 2012.
Find full textBertino, Elisa. Data Protection from Insider Threats. Morgan & Claypool Publishers, 2012.
Find full textGollmann, Dieter, Matt Bishop, Christian W. Probst, and Jeffrey Hunker. Insider Threats in Cyber Security. Springer London, Limited, 2010.
Find full textBertino, Elisa. Data Protection from Insider Threats. Springer International Publishing AG, 2012.
Find full textIAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2013.
Find full textIAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2020.
Find full textIAEA. Preventive and protective measures against insider Threats. International Atomic Energy Agency, 2008.
Find full textIAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2012.
Find full textSagan, Scott Douglas, and Matthew Bunn. Insider Threats (Cornell Studies in Security Affairs). Cornell University Press, 2017.
Find full textIAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2009.
Find full textCybersecurity and Infrastructure Security Agency. Insider Threat Mitigation Guide : Defining, Detecting, Assesing, and Managing Insider Threats: Cybersecurity and Infrastructure Security Agency. Independently Published, 2022.
Find full textDepartment of Defense. Do Innovative Thinkers Pose an Increased Insider Threat?: A Preliminary Analysis - Unintentional Insider Threats , Risk Taking, Mental Health Issues, Disgruntlement Traits, Cyber Security Threats. Independently Published, 2019.
Find full textThuraisingham, M. B. Mist'17: International Workshop on Managing Insider Security Threats. Association for Computing Machinery, 2017.
Find full textAgency, International Atomic Energy. Preventive and Protective Measures Against Insider Threats (Arabic Edition). International Atomic Energy Agency, 2022.
Find full textIAEA. Preventive and Protective Measures Against Insider Threats (Spanish Edition). International Atomic Energy Agency, 2022.
Find full textAgency, International Atomic Energy. Preventive and Protective Measures Against Insider Threats (French Edition). International Atomic Energy Agency, 2022.
Find full textFoster, Melissa A. Insider Threats: Department of Defense Protection of Classified Information and Installations. Nova Science Publishers, Incorporated, 2016.
Find full textLeighton, Cedric, and Amy Love Leighton. Insider Threats: A Business Leader's Guide to Managing Employees and Cyber Security. Taylor & Francis Group, 2021.
Find full textProceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, 2015.
Find full textProceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, 2016.
Find full textU. S. Government Accountability Offi Gao. Insider Threats: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems. Independently Published, 2019.
Find full textU. S. Government Accountability Offi Gao. Insider Threats: DOD Should Improve Information Sharing and Oversight to Protect U. S. Installations. Independently Published, 2019.
Find full text(Reviewer), Dave Kleiman, ed. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress, 2006.
Find full textMeloy, J. Reid, and Jens Hoffmann, eds. International Handbook of Threat Assessment. 2nd ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780190940164.001.0001.
Full textGovernment, U. S., and Department of Homeland Security. 2019 Cybersecurity and Infrastructure Security: Risks Introduced by 5G Adoption in U. S. ; Insider Threat Programs for Critical Manufacturing Sector; Strategic Intent, Election Security, Urgent Threats. Independently Published, 2019.
Find full textLuckey, David, David Stebbins, Rebeca Orrie, Erin Rebhan, Sunny Bhatt, and Sina Beaghley. Assessing Continuous Evaluation Approaches for Insider Threats: How Can the Security Posture of the U.S. Departments and Agencies Be Improved? RAND Corporation, 2019. http://dx.doi.org/10.7249/rr2684.
Full textOrrie, Rebeca, David Stebbins, David Luckey, Sunny D. Bhatt, and Sina Beaghley. Assessing Continuous Evaluation Approaches for Insider Threats: How Can the Security Posture of the U. S. Departments and Agencies Be Improved? RAND Corporation, The, 2019.
Find full textGovernment, U. S., House Of Representatives, and Transportation and Protective Security. Insider Threats to Aviation Security: Airline and Airport Perspectives - Hijacking, Drug and Weapon Smuggling, Human Trafficking, Terrorism, TSA Screening and Employee Vetting and Access Control. Independently Published, 2019.
Find full text