![9780387773216-0387773215-Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security, 39)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_41L76hnip2L._SL500_.jpg)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security, 39)
ISBN-13:
9780387773216
ISBN-10:
0387773215
Edition:
2008
Author:
Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Salvatore Stolfo, Sean W. Smith, Shlomo Hershkop
Publication date:
2008
Publisher:
Springer
Format:
Hardcover
235 pages
FREE US shipping
Book details
ISBN-13:
9780387773216
ISBN-10:
0387773215
Edition:
2008
Author:
Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Salvatore Stolfo, Sean W. Smith, Shlomo Hershkop
Publication date:
2008
Publisher:
Springer
Format:
Hardcover
235 pages
Summary
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security, 39) (ISBN-13: 9780387773216 and ISBN-10: 0387773215), written by authors
Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Salvatore Stolfo, Sean W. Smith, Shlomo Hershkop, was published by Springer in 2008.
With an overall rating of 3.9 stars, it's a notable title among other
Computer Certification
(Information Theory, Computer Science, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Algorithms, Programming, Hacking) books. You can easily purchase or rent Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security, 39) (Hardcover) from BooksRun,
along with many other new and used
Computer Certification
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats. In some ways, the insider problem is the ultimate security problem.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}