Librería Samer Atenea
Librería Aciertas (Toledo)
Kálamo Books
Librería Perelló (Valencia)
Librería Elías (Asturias)
Donde los libros
Librería Kolima (Madrid)
Librería Proteo (Málaga)
The Insider Attack Problem Nature and Scope.- Reflections on the Insider Threat.- The 'Big Picture' of Insider IT Sabotage Across U.S. Critical Infrastructures.- Data Theft: A Prototypical Insider Threat.- A Survey of Insider Attack Detection Research.- Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure.- Towards a Virtualization-enabled Framework for Information Traceability (VFIT).- Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.- Surviving Insider Attacks: A Call for System Experiments.- Preventative Directions For Insider Threat Mitigation Via Access Control.- Taking Stock and Looking Forward - An Outsider’s Perspective on the Insider Threat.- Hard Problems and Research Challenges.- Hard Problems and Research Challenges Concluding Remarks.