|
Showing 1 - 2 of
2 matches in All Departments
The Secret Service, FBI, NSA, CERT (Computer Emergency Response
Team) and George Washington University have all identified Insider
Threats as one of the most significant challenges facing IT,
security, law enforcement, and intelligence professionals today.
This book will teach IT professional and law enforcement officials
about the dangers posed by insiders to their IT infrastructure and
how to mitigate these risks by designing and implementing secure IT
systems as well as security and human resource policies. The book
will begin by identifying the types of insiders who are most likely
to pose a threat. Next, the reader will learn about the variety of
tools and attacks used by insiders to commit their crimes
including: encryption, steganography, and social engineering. The
book will then specifically address the dangers faced by
corporations and government agencies. Finally, the reader will
learn how to design effective security systems to prevent insider
attacks and how to investigate insider security breeches that do
occur.
Throughout the book, the authors will use their backgrounds in the
CIA to analyze several, high-profile cases involving insider
threats.
* Tackles one of the most significant challenges facing IT,
security, law enforcement, and intelligence professionals today
* Both co-authors worked for several years at the CIA, and they use
this experience to analyze several high-profile cases involving
insider threat attacks
* Despite the frequency and harm caused by insider attacks, there
are no competing books on this topic.books on this topic"
This book shows everyday computer users how to become
cyber-sleuths. It takes readers through the many different issues
involved in spying on someone online. It begins with an explanation
of reasons and ethics, covers the psychology of spying, describes
computer and network basics, and takes readers step-by-step through
many common online activities, and shows what can be done to
compromise them. The book's final section describes personal
privacy and counter-spy techniques. By teaching by both theory and
example this book empowers readers to take charge of their
computers and feel confident they can be aware of the different
online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA
and all reside now at Sytex, one of the largest government
providers of IT services.
*Targets an area that is not addressed by other books: black hat
techniques for computer security at the personal computer level.
*Targets a wide audience: personal computer users, specifically
those interested in the online activities of their families.
|
You may like...
Dune: Part 2
Timothee Chalamet, Zendaya, …
DVD
R215
Discovery Miles 2 150
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Uglies
Scott Westerfeld
Paperback
R265
R75
Discovery Miles 750
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|