Please register here if you want to download anything!

Insider Threats

Cybersecurity Threats: Insider Threats  eBooks & eLearning

Posted by naag at Oct. 15, 2017
Cybersecurity Threats: Insider Threats

Cybersecurity Threats: Insider Threats
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 224 MB
Genre: eLearning | Language: English

Do you have an insider threat program in your organization? Insider threats are one of the top ten threats facing organizations today. Learn how to detect insider threats and how to deploy countermeasures to protect against them.
Insider Threats Meet Access Control: Insider Threats Detected Using Intent-based Access Control (IBAC)

Insider Threats Meet Access Control: Insider Threats Detected Using Intent-based Access Control (IBAC) by Abdulaziz Almehmadi
English | January 10, 2019 | ASIN: B07MG8JN7S | 226 pages | AZW3 | 5.88 MB

Insider Threats  eBooks & eLearning

Posted by Underaglassmoon at May 8, 2017
Insider Threats

Insider Threats
Cornell University Press | English | 2016 | ISBN-10: 1501705164 | 216 pages | PDF | 2.01 mb

by Matthew Bunn (Editor), Scott D. Sagan (Editor)
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

Brian Contos - Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures
2007 | ISBN: 1597491292 | English | 304 pages | PDF | 6.3 MB
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Repost)

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes by Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak
Publisher: Addison-Wesley Professional | 2012 | ISBN: 0321812573 | 432 pages | PDF + EPUB | (5,5 + 7,9) MB

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets.

Insider Threats Meet Access Control  eBooks & eLearning

Posted by AlenMiler at Oct. 30, 2016
Insider Threats Meet Access Control

Insider Threats Meet Access Control by Abdulaziz Almehmadi
English | 28 Oct 2016 | ASIN: B01MFDXYWQ | 143 Pages | PDF | 2.89 MB

Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions.

Insider Threats  eBooks & eLearning

Posted by roxul at April 4, 2018
Insider Threats

Pierre–Emmanuel Arduin, "Insider Threats"
English | ISBN: 1848219725 | 2018 | 164 pages | PDF | 12 MB
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Repost)

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes By Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak
2012 | 432 Pages | ISBN: 0321812573 | PDF | 6 MB
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks (Repost)

Kenneth Brancik, "Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks"
2007 | pages: 506 | ISBN: 1420046594 | PDF | 4,9 mb

CompTIA Security+ (SY0-401) Cert Prep: Threats and Vulnerabilities  eBooks & eLearning

Posted by Landau17 at Oct. 1, 2017
CompTIA Security+ (SY0-401) Cert Prep: Threats and Vulnerabilities

CompTIA Security+ (SY0-401) Cert Prep: Threats and Vulnerabilities
MP4 | Video: 720p | Duration: 2:46:14 | English | Subtitles: VTT | 469.4 MB