CART

(0) items

Policies, Procedures, and Technologies to Defend Against the Insider Threat,9781439860243
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Policies, Procedures, and Technologies to Defend Against the Insider Threat

by ;
Edition:
1st
ISBN13:

9781439860243

ISBN10:
1439860246
Format:
Hardcover
Pub. Date:
11/16/2013
Publisher(s):
Auerbach Public
List Price: $79.95

Rent Textbook

(Recommended)
 
Term
Due
Price
$71.96

Buy New Textbook

Usually Ships in 3-5 Business Days
N9781439860243
$77.95

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 1st edition with a publication date of 11/16/2013.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Summary

Securing information from insider threats need to start early. Policies and procedures need to be in place to mitigate the risks associated with an insider prior to establishing trust. Once trust is established, expectations must be set. Laying out policies, procedures, and technologies necessary to effectively prevent, detect, and react to insider threats, this book is an indispensable reference for those interested in taking a best practice approach to securing against the insider threat. Focusing on technology, the text takes a holistic approach to ensuring the confidentiality, availability, and integrity of information.


Please wait while the item is added to your cart...