Insider threats in cyber security
Saved in:
Other Authors: | Probst, Christian W. |
---|---|
Format: | Book |
Published: |
New York
Springer
2010
|
Series: | Advances in information security
v. 49 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Infosecurity 2008 threat analysis
Published: (2008) -
Role-based access control
by: Ferraiolo, David
Published: (2007) -
How secure is your wireless network? safeguarding your Wi-Fi- LAN
by: Barken, Lee
Published: (2004) -
Mechanics of user identification and authentication fundamentals of identity management
by: Todorov, Dobromir
Published: (2007) -
Computer security
Published: (1986)