skip to content
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks Preview this item
ClosePreview this item
Checking...

Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks

Author: Kenneth C Brancik
Publisher: Boca Raton : Auerbach Publications, ©2008.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:

Employees know a company's computer system better than anyone and have access to important information about the company and its customers. This access makes greedy or disgruntled employees to  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Kenneth C Brancik
ISBN: 9781420046595 1420046594
OCLC Number: 123955117
Description: xxxiii, 470 pages : illustrations ; 25 cm
Contents: Insider computer fraud (ICF) --
Related research in insider computer fraud and information security controls --
The insider threat strategic planning process --
Information technology architecture and insider computer fraud prevention --
Protection of web sites from insider abuse and the information technology infrastructure --
Web services security and control considerations for reducing transaction risks --
Application security and methods for reducing insider computer fraud --
Insider computer fraud taxonomy and the art of the key fraud indicator (KFI) selection process --
Key fraud signature (KFS) selection process for detecting insider computer fraud --
Application and system journaling and the software engineering process --
The role of neural networks in the insider computer fraud framework --
Appendix A : Application access controls --
Appendix B : Application data organization/input --
Appendix C : Application data processing --
Appendix D : Application output/management information system (MIS) --
Appendix E : Key fraud signature (KFS) worksheet --
Appendix F : Cyber-security healthcheck --
Appendix G : Acronym list --
Appendix H : Glossary.
Responsibility: Kenneth C. Brancik.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/123955117> # Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "123955117" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/802963423#Place/boca_raton> ; # Boca Raton
   schema:about <http://experiment.worldcat.org/entity/work/data/802963423#Topic/computerkriminalitat> ; # Computerkriminalität
   schema:about <http://experiment.worldcat.org/entity/work/data/802963423#Topic/criminalite_informatique> ; # Criminalité informatique
   schema:about <http://experiment.worldcat.org/entity/work/data/802963423#Topic/computersicherheit> ; # Computersicherheit
   schema:about <http://experiment.worldcat.org/entity/work/data/802963423#Topic/eindringerkennung> ; # Eindringerkennung
   schema:about <http://id.worldcat.org/fast/872063> ; # Computer crimes
   schema:about <http://experiment.worldcat.org/entity/work/data/802963423#Topic/securite_informatique> ; # Sécurité informatique
   schema:about <http://experiment.worldcat.org/entity/work/data/802963423#Topic/fraude_sur_internet_protection> ; # Fraude sur Internet--Protection
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2008" ;
   schema:creator <http://viaf.org/viaf/270709731> ; # Kenneth C. Brancik
   schema:datePublished "2008" ;
   schema:description "Insider computer fraud (ICF) -- Related research in insider computer fraud and information security controls -- The insider threat strategic planning process -- Information technology architecture and insider computer fraud prevention -- Protection of web sites from insider abuse and the information technology infrastructure -- Web services security and control considerations for reducing transaction risks -- Application security and methods for reducing insider computer fraud -- Insider computer fraud taxonomy and the art of the key fraud indicator (KFI) selection process -- Key fraud signature (KFS) selection process for detecting insider computer fraud -- Application and system journaling and the software engineering process -- The role of neural networks in the insider computer fraud framework -- Appendix A : Application access controls -- Appendix B : Application data organization/input -- Appendix C : Application data processing -- Appendix D : Application output/management information system (MIS) -- Appendix E : Key fraud signature (KFS) worksheet -- Appendix F : Cyber-security healthcheck -- Appendix G : Acronym list -- Appendix H : Glossary."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/802963423> ;
   schema:inLanguage "en" ;
   schema:name "Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks"@en ;
   schema:productID "123955117" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/123955117#PublicationEvent/boca_raton_auerbach_publications_2008> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/802963423#Agent/auerbach_publications> ; # Auerbach Publications
   schema:url <http://catdir.loc.gov/catdir/toc/ecip0716/2007017696.html> ;
   schema:workExample <http://worldcat.org/isbn/9781420046595> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA749557> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/123955117> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/802963423#Agent/auerbach_publications> # Auerbach Publications
    a bgn:Agent ;
   schema:name "Auerbach Publications" ;
    .

<http://experiment.worldcat.org/entity/work/data/802963423#Topic/computerkriminalitat> # Computerkriminalität
    a schema:Intangible ;
   schema:name "Computerkriminalität"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/802963423#Topic/criminalite_informatique> # Criminalité informatique
    a schema:Intangible ;
   schema:name "Criminalité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/802963423#Topic/fraude_sur_internet_protection> # Fraude sur Internet--Protection
    a schema:Intangible ;
   schema:name "Fraude sur Internet--Protection"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/802963423#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
   schema:name "Sécurité informatique"@fr ;
    .

<http://id.worldcat.org/fast/872063> # Computer crimes
    a schema:Intangible ;
   schema:name "Computer crimes"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/270709731> # Kenneth C. Brancik
    a schema:Person ;
   schema:familyName "Brancik" ;
   schema:givenName "Kenneth C." ;
   schema:name "Kenneth C. Brancik" ;
    .

<http://worldcat.org/isbn/9781420046595>
    a schema:ProductModel ;
   schema:isbn "1420046594" ;
   schema:isbn "9781420046595" ;
    .

<http://www.worldcat.org/title/-/oclc/123955117>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/123955117> ; # Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
   schema:dateModified "2018-03-09" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.