Cart
Free Shipping in Australia
Proud to be B-Corp

Insider Attack and Cyber Security Salvatore J. Stolfo

Insider Attack and Cyber Security By Salvatore J. Stolfo

Insider Attack and Cyber Security by Salvatore J. Stolfo


$241.09
Condition - New
Out of stock

Summary

This book defines the nature and scope of insider problems as viewed by the financial industry. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats.

Insider Attack and Cyber Security Summary

Insider Attack and Cyber Security: Beyond the Hacker by Salvatore J. Stolfo

This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats. In some ways, the insider problem is the ultimate security problem.

Insider Attack and Cyber Security Reviews

From the reviews:

"This edited book provides a timely summary of recent research and development results in this area of insider-related cybersecurity issues. ... the book is up to the standards for presentation to an academic audience ... . this book does add positively to the developing literature on insider attacks ... ." (Kim-Kwang Raymond Choo, ACM Computing Reviews, March, 2009)

Table of Contents

The Insider Attack Problem Nature and Scope.- Reflections on the Insider Threat.- The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures.- Data Theft: A Prototypical Insider Threat.- A Survey of Insider Attack Detection Research.- Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure.- Towards a Virtualization-enabled Framework for Information Traceability (VFIT).- Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.- Surviving Insider Attacks: A Call for System Experiments.- Preventative Directions For Insider Threat Mitigation Via Access Control.- Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat.- Hard Problems and Research Challenges.- Hard Problems and Research Challenges Concluding Remarks.

Additional information

NLS9781441945891
9781441945891
144194589X
Insider Attack and Cyber Security: Beyond the Hacker by Salvatore J. Stolfo
New
Paperback
Springer-Verlag New York Inc.
2010-11-19
223
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a new book - be the first to read this copy. With untouched pages and a perfect binding, your brand new copy is ready to be opened for the first time

Customer Reviews - Insider Attack and Cyber Security