|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910452081203321 |
|
|
Autore |
Catrantzos Nick |
|
|
Titolo |
Managing the insider threat : no dark corners / / Nick Catrantzos |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton, Fla. : , : CRC Press, , 2012 |
|
|
|
|
|
|
|
ISBN |
|
0-429-25147-5 |
1-4665-6656-6 |
1-4398-7293-7 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (357 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Corporations - Security measures |
Employee crimes - Prevention |
Sabotage in the workplace - Prevention |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Foreword; Preface; Author; Chapter 1 - The Problem and Limits of Accepted Wisdom; Chapter 2 - New Research and Contrarian Findings; Chapter 5 - Rethinking Background Investigations; Chapter 6 - Deception and the Insider Threat; Chapter 7 - Lawful Disruption of the Insider Threat; Chapter 8 - Existential Insider Threats; Chapter 9 - Other Insider Threats; Chapter 10 - Consulting for No Dark Corners Implementation; Chapter 11 - Answer Guide; Appendix A: Three Rounds of Delphi Questions; Appendix B: Summary of Delphi Round 1 Findings Accompanying Round 2 Questions |
Appendix C: Summary of Delphi Round 2 Findings Accompanying Round 3 QuestionsAppendix D: Delphi Expert Comments and Stories; Back Cover |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
An adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. Drawn from the findings of an award-winning thesis, Managing the Insider Threat: No Dark Corners is the first comprehensive resource to use social science research to explain why traditional methods fail against these trust betrayers. In this groundbreaking book, author Nick Catrantzos identifies new |
|
|
|
|