To see the other types of publications on this topic, follow the link: Insider threats.

Books on the topic 'Insider threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Insider threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Arduin, Pierre-Emmanuel. Insider Threats. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bertino, Elisa. Data Protection from Insider Threats. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-01890-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Probst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Contos, Brian T. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Elsevier, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Andrew, Moore, and Trzeciak Randall, eds. The CERT guide to insider threats: How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). Addison-Wesley, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elam, Jason. Inside threat: A Riley Covington thriller. Tyndale House Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Godse, Vinayak. The threat within: A study on insider threat by DSCI in collaboration with PwC. Data Security Council of India, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1954-, Hoffman Bruce, United States. Dept. of Energy., and Rand Corporation, eds. Insider crime: The threat to nuclear facilities and programs. Rand Corp., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bunn, Matthew, and Scott D. Sagan, eds. Insider Threats. Cornell University Press, 2017. http://dx.doi.org/10.7591/9781501705946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Sagan, Scott Douglas, and Matthew Bunn. Insider Threats. Cornell University Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Arduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Arduin, Pierre-Emmanuel, and Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Insider Threats. Cornell University Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bertino, Elisa. Data Protection from Insider Threats. Morgan & Claypool Publishers, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bertino, Elisa. Data Protection from Insider Threats. Morgan & Claypool Publishers, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Insider Threats in Cyber Security. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gollmann, Dieter, Matt Bishop, Christian W. Probst, and Jeffrey Hunker. Insider Threats in Cyber Security. Springer London, Limited, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bertino, Elisa. Data Protection from Insider Threats. Springer International Publishing AG, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Insider threats in cyber security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

IAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

IAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

IAEA. Preventive and protective measures against insider Threats. International Atomic Energy Agency, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

IAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Sagan, Scott Douglas, and Matthew Bunn. Insider Threats (Cornell Studies in Security Affairs). Cornell University Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

IAEA. Preventive and Protective Measures Against Insider Threats. International Atomic Energy Agency, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Cybersecurity and Infrastructure Security Agency. Insider Threat Mitigation Guide : Defining, Detecting, Assesing, and Managing Insider Threats: Cybersecurity and Infrastructure Security Agency. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Department of Defense. Do Innovative Thinkers Pose an Increased Insider Threat?: A Preliminary Analysis - Unintentional Insider Threats , Risk Taking, Mental Health Issues, Disgruntlement Traits, Cyber Security Threats. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Thuraisingham, M. B. Mist'17: International Workshop on Managing Insider Security Threats. Association for Computing Machinery, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Agency, International Atomic Energy. Preventive and Protective Measures Against Insider Threats (Arabic Edition). International Atomic Energy Agency, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

IAEA. Preventive and Protective Measures Against Insider Threats (Spanish Edition). International Atomic Energy Agency, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Agency, International Atomic Energy. Preventive and Protective Measures Against Insider Threats (French Edition). International Atomic Energy Agency, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Foster, Melissa A. Insider Threats: Department of Defense Protection of Classified Information and Installations. Nova Science Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Leighton, Cedric, and Amy Love Leighton. Insider Threats: A Business Leader's Guide to Managing Employees and Cyber Security. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

U. S. Government Accountability Offi Gao. Insider Threats: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

U. S. Government Accountability Offi Gao. Insider Threats: DOD Should Improve Information Sharing and Oversight to Protect U. S. Installations. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

(Reviewer), Dave Kleiman, ed. Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Meloy, J. Reid, and Jens Hoffmann, eds. International Handbook of Threat Assessment. 2nd ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780190940164.001.0001.

Full text
Abstract:
The International Handbook of Threat Assessment, second edition, is a broad and deep exploration of the discipline of threat assessment and management, reflecting the magnitude of growth in this burgeoning scientific field over the past decade. Divided into three sections—foundations, fields of practice, and operations—this volume’s contributors include virtually all experts from the global community. New areas of work are emphasized, including lone actor terrorism, cyberthreats, insider threats, false allegations and bystanders. Established areas of work are further delineated, including workplace violence, stalking, public figure threats and attacks, direct threats of violence, proximal warning behaviors, legal issues in management, domestic violence threat assessment, honor-based violence, source interviewing, and evidence-based threat management in both secondary education and university settings. This second edition, almost twice the size of the first edition, has been written for both scholars and operators as the foundational textbook in the field.
APA, Harvard, Vancouver, ISO, and other styles
42

Government, U. S., and Department of Homeland Security. 2019 Cybersecurity and Infrastructure Security: Risks Introduced by 5G Adoption in U. S. ; Insider Threat Programs for Critical Manufacturing Sector; Strategic Intent, Election Security, Urgent Threats. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Luckey, David, David Stebbins, Rebeca Orrie, Erin Rebhan, Sunny Bhatt, and Sina Beaghley. Assessing Continuous Evaluation Approaches for Insider Threats: How Can the Security Posture of the U.S. Departments and Agencies Be Improved? RAND Corporation, 2019. http://dx.doi.org/10.7249/rr2684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Orrie, Rebeca, David Stebbins, David Luckey, Sunny D. Bhatt, and Sina Beaghley. Assessing Continuous Evaluation Approaches for Insider Threats: How Can the Security Posture of the U. S. Departments and Agencies Be Improved? RAND Corporation, The, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Insider Threat. Elsevier, 2016. http://dx.doi.org/10.1016/c2013-0-23375-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Insider Threat. Elsevier, 2006. http://dx.doi.org/10.1016/b978-1-59749-048-1.x5000-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rainwater, K. B. Insider Threat. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Thompson, Eleanor E. Insider Threat. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Insider Threat. Head of Zeus, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Government, U. S., House Of Representatives, and Transportation and Protective Security. Insider Threats to Aviation Security: Airline and Airport Perspectives - Hijacking, Drug and Weapon Smuggling, Human Trafficking, Terrorism, TSA Screening and Employee Vetting and Access Control. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography