Insider threats
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological pers...
Saved in:
| Main Author: | Arduin, Pierre-Emmanuel (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
©2018
|
| Series: | Advances in information systems set
volume 10 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Googling security : how much does Google know about you? /
by: Conti, Greg
Published: (2009)
by: Conti, Greg
Published: (2009)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
CompTIA Security+ 2008 in depth
by: Ciampa, Mark
Published: (2008)
by: Ciampa, Mark
Published: (2008)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Principles of information systems security text and cases
by: Dhillon 1963-
Published: (2007)
by: Dhillon 1963-
Published: (2007)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Information security evaluation a holistic approach
by: Tashi, Igli
Published: (2011)
by: Tashi, Igli
Published: (2011)
SECURITY TESTING MODEL FOR DETECTING SQL INJECTION VULNERABILITY IN WEB APPLICATION /
by: Nor Fatimah Awang
by: Nor Fatimah Awang
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Threat modeling designing for security
by: Shostack, Adam
Published: (2014)
by: Shostack, Adam
Published: (2014)
Architecturing secure software systems
by: Talukderan, Asoke K.
Published: (2009)
by: Talukderan, Asoke K.
Published: (2009)
Inside network perimeter security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
by: Northcutt, Stephen, et al.
Published: (2005)
by: Northcutt, Stephen, et al.
Published: (2005)
Computer and information security handbook
Published: (2009)
Published: (2009)
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)
by: Masud, Mehedy
Published: (2012)
Computer and information security handbook
Published: (2013)
Published: (2013)
The craft system security
by: Smith 1964-
Published: (2007)
by: Smith 1964-
Published: (2007)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
Hacker
Published: (2003)
Published: (2003)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Honeypots a new paradigm to information security
by: Joshi, R.C
Published: (2011)
by: Joshi, R.C
Published: (2011)
Trust and security in collaborative computing
by: Zou, Xukai, 1963-
Published: (2008)
by: Zou, Xukai, 1963-
Published: (2008)
The software vulnerability guide
by: Thompson
Published: (2005)
by: Thompson
Published: (2005)
SQL injection attacks and defense
by: Clarke, Justin
Published: (2012)
by: Clarke, Justin
Published: (2012)
Cyber-security and threat politics US efforts to secure the information age
by: Dunn Cavelty, Myriam
Published: (2007)
by: Dunn Cavelty, Myriam
Published: (2007)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
The basics of information security understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2011)
by: Andress, Jason
Published: (2011)
Security software development assessing and managing security risks
by: Ashbaugh
Published: (2009)
by: Ashbaugh
Published: (2009)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Microsoft Windows server 2008 security resource kit
by: Johansson, Jesper M.
Published: (2008)
by: Johansson, Jesper M.
Published: (2008)
Securing systems applied security architecture and threat models
by: Schoenfield, Brook S. E.
Published: (2015)
by: Schoenfield, Brook S. E.
Published: (2015)
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
IT auditing using controls to protect information assets
by: Davis, Chris (Christopher Michael)
Published: (2011)
by: Davis, Chris (Christopher Michael)
Published: (2011)
Web application vunerabilities Detect, exploit,prevent
by: Palmer
Published: (2007)
by: Palmer
Published: (2007)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Similar Items
-
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023) -
Googling security : how much does Google know about you? /
by: Conti, Greg
Published: (2009) -
Introduction to security and network forensics
by: Buchanan, William
Published: (2011) -
Computer security principles and practice
by: Stallings, William
Published: (2008) -
CompTIA Security+ 2008 in depth
by: Ciampa, Mark
Published: (2008)


