جزییات کتاب
Throughout, Contos uses his extensive personal experiences to illustrate Internet security breaches and provide countermeasures. This book requires little if any technical background and is intended to appeal to a broad audience.- Choice, E. M. Aupperle Content: Acknowledgments, Page vAbout the Author, Page viiAcknowledgements by author, Pages viii-xTechnical Reviewer, Page xiForeword, Pages xix-xxIntroduction, Pages xxi-xxiiChapter 1 - Cyber Crime and Cyber Criminals 101, Pages 3-47Chapter 2 - Insider Threats, Pages 49-68Chapter 3 - Enterprise Security Management (ESM), Pages 69-98Chapter 4 - Imbalanced Security—A Singaporean Data Center, Pages 101-106Chapter 5 - Comparing Physical & Logical Security Events—A U.S. Government Agency, Pages 107-114Chapter 6 - Insider with a Conscience—An Austrian Retailer, Pages 115-122Chapter 7 - Collaborative Threat—A Telecommunications Company in the U.S., Pages 123-128Chapter 8 - Outbreak from Within—A Financial Organization in the U.K., Pages 129-135Chapter 9 - Mixing Revenge and Passwords—A Utility Company in Brazil, Pages 137-143Chapter 10 - Rapid Remediation—A University in the United States, Pages 145-153Chapter 11 - Suspicious Activity—A Consulting Company in Spain, Pages 155-159Chapter 12 - Insiders Abridged, Pages 161-168Chapter 13 - Establishing Chain-of-Custody Best Practices with ESM, Pages 171-177Chapter 14 - Addressing Both Insider Threats and Sarbanes-Oxley with ESM, Pages 179-185Chapter 15 - Incident Management with ESM, Pages 187-198Chapter 16 - Insider Threat Questions and Answers, Pages 199-236Appendix A - Examples of Cyber Crime Prosecutions, Pages 237-248Bibliography, Pages 249-252Index, Pages 253-262