Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks /: an in-depth framework for detecting and defending against insider IT attacks. (©2008)
- Record Type:
- Book
- Title:
- Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks /: an in-depth framework for detecting and defending against insider IT attacks. (©2008)
- Main Title:
- Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
- Further Information:
- Note: Kenneth C. Brancik.
- Other Names:
- Brancik, Kenneth C
- Contents:
- Computer generated contents: Chapt. 1. Insider computer fraud (ICF) -- chapt. 2. Related research in insider computer fraud and information security controls -- chapt. 3. The insider threat strategic planning process -- chapt. 4. Information technology architecture and insider computer fraud prevention -- chapt. 5. Protection of web sites from insider abuse and the information technology infrastructure -- chapt. 6. Web services security and control considerations for reducing transaction risks -- chapt. 7. Application security and methods for reducing insider computer fraud -- chapt. 8. Insider computer fraud taxonomy and the art of the key fraud indicator (KFI) selection process -- chapt. 9. Key fraud signature (KFS) selection process for detecting insider computer fraud -- chapt. 10. Application and system journaling and the software engineering process -- chapt. 11. The role of neural networks in the insider computer fraud framework -- chapt. 2. Related research in insider computer fraud and information security controls -- chapt. 3. The insider threat strategic planning process -- chapt. 4. Information technology architecture and insider computer fraud prevention -- chapt. 5. Protection of web sites from insider abuse and the IT infrastructure -- chapt. 6. Web services security and control considerations for reducing transaction risks -- chapt. 7. Application security and methods for reducing ICF -- chapt. 8. Insider computer fraud taxonomy and the art of the key fraudComputer generated contents: Chapt. 1. Insider computer fraud (ICF) -- chapt. 2. Related research in insider computer fraud and information security controls -- chapt. 3. The insider threat strategic planning process -- chapt. 4. Information technology architecture and insider computer fraud prevention -- chapt. 5. Protection of web sites from insider abuse and the information technology infrastructure -- chapt. 6. Web services security and control considerations for reducing transaction risks -- chapt. 7. Application security and methods for reducing insider computer fraud -- chapt. 8. Insider computer fraud taxonomy and the art of the key fraud indicator (KFI) selection process -- chapt. 9. Key fraud signature (KFS) selection process for detecting insider computer fraud -- chapt. 10. Application and system journaling and the software engineering process -- chapt. 11. The role of neural networks in the insider computer fraud framework -- chapt. 2. Related research in insider computer fraud and information security controls -- chapt. 3. The insider threat strategic planning process -- chapt. 4. Information technology architecture and insider computer fraud prevention -- chapt. 5. Protection of web sites from insider abuse and the IT infrastructure -- chapt. 6. Web services security and control considerations for reducing transaction risks -- chapt. 7. Application security and methods for reducing ICF -- chapt. 8. Insider computer fraud taxonomy and the art of the key fraud indicator (KFI) selection process -- chapt. 9. Key fraud signature (KFS) selection process for detecting ICF -- chapt. 10. Application and system journaling and the software engineering process -- chapt. 11. The role of neural networks in the ICF framework. … (more)
- Publisher Details:
- Boca Raton : Auerbach Publications
- Publication Date:
- 2008
- Copyright Date:
- 2008
- Extent:
- 1 online resource (xxxiii, 470 pages), illustrations
- Subjects:
- 005.8
Computer security
Computer crimes
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Computer crimes
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 1420046608
9781420046601 - Related ISBNs:
- 9781420046595
1420046594 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.163171
- Ingest File:
- 01_065.xml