Abstract
The risk of malicious exploitation by insiders is often quoted as one of the major security risks faced by both the public and private sector organizations. This edited book provides a timely summary of recent research and development results in this area of insider-related cybersecurity issues.
Original language | English |
---|---|
Pages | 2pp |
No. | 51 |
Specialist publication | Computing Reviews |
Publication status | Published - 2009 |