000448034 000__ 01164cam\a2200313Ia\4500 000448034 001__ 448034 000448034 005__ 20210513154754.0 000448034 006__ m\\\\\\\\d\\\\\\\\ 000448034 007__ cr\cn||||||||| 000448034 008__ 061005s2006\\\\maua\\\\sb\\\\001\0\eng\d 000448034 020__ $$z9781597491297 000448034 020__ $$z1597491292 000448034 035__ $$a(CaPaEBR)ebr10186105 000448034 035__ $$a(OCoLC)648300538 000448034 040__ $$aCaPaEBR$$cCaPaEBR 000448034 05014 $$aTK5105.59$$b.C658 2006eb 000448034 1001_ $$aContos, Brian T. 000448034 24510 $$aEnemy at the water cooler$$h[electronic resource] :$$breal-life stories of insider threats and Enterprise Security Management countermeasures /$$cBrian T. Contos. 000448034 260__ $$aRockland, MA :$$bSyngress,$$cc2006. 000448034 300__ $$axxii, 262 p. :$$bill. 000448034 504__ $$aIncludes bibliographical references and index. 000448034 506__ $$aAccess limited to authorized users. 000448034 650_0 $$aComputer networks$$xSecurity measures. 000448034 650_0 $$aComputer security. 000448034 650_0 $$aHackers. 000448034 655_7 $$aElectronic books.$$2lcsh 000448034 852__ $$bebk 000448034 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10186105$$zOnline Access 000448034 909CO $$ooai:library.usi.edu:448034$$pGLOBAL_SET 000448034 980__ $$aEBOOK 000448034 980__ $$aBIB 000448034 982__ $$aEbook 000448034 983__ $$aOnline