In print
Ebook
Audiobook
Library
We may earn a commission. Learn more.
The CERT Guide to Insider Threats How to Prevent, Detect, and Respond to Information Technology Crimes (theft, Sabotage, Fraud)
Wikileaks recent data exposures demonstrate the danger now posed by insiders, who can often bypass physical and technical security measures designed to prevent unauthorized access. The insider threat team at CERT helps readers systematically identify, prevent, detect, and mitigate threats.
No reviews yet.
Be the first to write one.
No highlights yet.
Be the first to share one.