Sold Out
Book Categories |
This is the second in a series of conference reports on the topic of R&D initiatives to mitigate and thwart the insider threat to critical U.S. defense and infrastructure information systems. This workshop's main focus areas were long-term research challenges and goals toward mitigating the insider threat; developing insider threat models; and developing near-term solutions using commercial off-the-shelf and government off-the-shelf products. The long-term research recommendations stressed the need to develop underlying system architecture designed explicitly with security and survivability in mind. The report also contains a number of recommendations regarding the purposes and design of models of insider behavior, and near-term recommendations for helping to prevent, discover, and mitigate the threat of insider misuse of information systems.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionResearch on mitigating the insider threat to information systems--#2
X
This Item is in Your InventoryResearch on mitigating the insider threat to information systems--#2
X
You must be logged in to review the productsX
X
X
Add Research on mitigating the insider threat to information systems--#2, , Research on mitigating the insider threat to information systems--#2 to the inventory that you are selling on WonderClubX
X
Add Research on mitigating the insider threat to information systems--#2, , Research on mitigating the insider threat to information systems--#2 to your collection on WonderClub |