menu
{ "item_title" : "Enemy at the Water Cooler", "item_author" : [" Brian T. Contos "], "item_description" : "The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization's building or networks that possesses some level of trust.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/59/749/129/1597491292_b.jpg", "price_data" : { "retail_price" : "54.95", "online_price" : "54.95", "our_price" : "54.95", "club_price" : "54.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Enemy at the Water Cooler|Brian T. Contos
Enemy at the Water Cooler : Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization's building or networks that possesses some level of trust.

Details

  • ISBN-13: 9781597491297
  • ISBN-10: 1597491292
  • Publisher: Syngress Publishing
  • Publish Date: January 2007
  • Dimensions: 8.92 x 7.06 x 0.84 inches
  • Shipping Weight: 0.88 pounds
  • Page Count: 290

Related Categories

BAM Customer Reviews