Description: Insider Attack and Cyber Security by Steven M. Bellovin, Salvatore J. Stolfo, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The book includes chapters by world renowned experts in this field. FORMAT Hardcover LANGUAGE English CONDITION Brand New Publisher Description Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks. Notes This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some ways, the insider problem is the ultimate security problem. The volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks. Back Cover Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of the insider attack problem as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Computer Science Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer security, and includes the following topics: critical IT infrastructure protection, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks. Insider Attack and Cyber Security: Beyond the Hacker is designed for a professional audience composed of researchers and practitioners in industry. It is also suitable as an advanced-level text or reference book for students in computer science and electrical engineering. Table of Contents The Insider Attack Problem Nature and Scope.- Reflections on the Insider Threat.- The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures.- Data Theft: A Prototypical Insider Threat.- A Survey of Insider Attack Detection Research.- Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure.- Towards a Virtualization-enabled Framework for Information Traceability (VFIT).- Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.- Surviving Insider Attacks: A Call for System Experiments.- Preventative Directions For Insider Threat Mitigation Via Access Control.- Taking Stock and Looking Forward – An Outsiders Perspective on the Insider Threat.- Hard Problems and Research Challenges.- Hard Problems and Research Challenges Concluding Remarks. Review From the reviews:"This edited book provides a timely summary of recent research and development results in this area of insider-related cybersecurity issues. … the book is up to the standards for presentation to an academic audience … . this book does add positively to the developing literature on insider attacks … ." (Kim-Kwang Raymond Choo, ACM Computing Reviews, March, 2009) Long Description Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks. Review Quote From the reviews:"This edited book provides a timely summary of recent research and development results in this area of insider-related cybersecurity issues. … the book is up to the standards for presentation to an academic audience … . this book does add positively to the developing literature on insider attacks … ." (Kim-Kwang Raymond Choo, ACM Computing Reviews, March, 2009) Feature Based on the first workshop for "Insider Attack for Cyber Security" Includes chapters by world renowned experts in this field Description for Sales People This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some ways, the insider problem is the ultimate security problem. The volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks. Details ISBN0387773215 Short Title INSIDER ATTACK & CYBER SECURIT Series Advances in Information Security Language English ISBN-10 0387773215 ISBN-13 9780387773216 Media Book Format Hardcover DEWEY 005.8 Series Number 39 Year 2008 Imprint Springer-Verlag New York Inc. Subtitle Beyond the Hacker Place of Publication New York, NY Country of Publication United States Edited by Salvatore J. Stolfo Affiliation Dartmouth College, Hanover, NH Birth 1964 Edition 2008th Author Sean W. Smith DOI 10.1007/978-0-387-77322-3 AU Release Date 2008-04-07 NZ Release Date 2008-04-07 US Release Date 2008-04-07 UK Release Date 2008-04-07 Pages 223 Publisher Springer-Verlag New York Inc. Edition Description 2008 ed. Publication Date 2008-04-07 Alternative 9781441945891 Illustrations 20 Illustrations, black and white; XII, 223 p. 20 illus. Audience Undergraduate We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:96298655;
Price: 218.64 AUD
Location: Melbourne
End Time: 2025-02-04T10:13:19.000Z
Shipping Cost: 10.93 AUD
Product Images
Item Specifics
Restocking fee: No
Return shipping will be paid by: Buyer
Returns Accepted: Returns Accepted
Item must be returned within: 30 Days
ISBN-13: 9780387773216
Book Title: Insider Attack and Cyber Security
Number of Pages: 223 Pages
Language: English
Publication Name: Insider Attack and Cyber Security: Beyond the Hacker
Publisher: Springer-Verlag New York Inc.
Publication Year: 2008
Subject: Computer Science
Item Height: 235 mm
Item Weight: 530 g
Type: Textbook
Author: Sara Sinclair, Salvatore J. Stolfo, Shlomo Hershkop, Sean W. Smith, Angelos D. Keromytis, Steven M. Bellovin
Subject Area: Information Science
Item Width: 155 mm
Format: Hardcover