This page constitutes a continuation of the copyright page, which begins on page iv.

S.R. Band, D.M. Cappelli, L.F. Fischer, A.P. Moore, E.D. Shaw, and R.F. Trzeciak, “Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis,” Software Engineering Institute Technical Report CMU/SEI-2006-TR-026, Carnegie Mellon University, December 2006. http://www.cert.org/archive/pdf/06tr026.pdf.

D.M. Cappelli, T. Caron, R.F. Trzeciak, and A.P. Moore, “Spotlight On: Programming Techniques Used as an Insider Attack Tool,” Joint CyLab (CMU) and CERT (SEI) Report, December 2008. http://www.cert.org/archive/pdf/insiderthreat_programmers_1208.pdf

D.M. Cappelli, Moore, A.P., Trzeciak, R.F. and Shimeall, T.J., “Common Sense Guide to Prevention and Detection ...

Get The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.