Cargando…

Business espionage : risk, threats, and countermeasures /

Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully exp...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wimmer, Bruce (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, Massachusetts : Elsevier, [2015]
Edición:First edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn908041044
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 141212t20152015maua ob 001 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d N$T  |d IDEBK  |d YDXCP  |d EBLCP  |d CDX  |d DEBSZ  |d OCLCF  |d IDB  |d OCLCQ  |d MERUC  |d OCLCQ  |d WRM  |d OCLCQ  |d CUY  |d LOA  |d ZCU  |d ICG  |d K6U  |d COCUF  |d DKC  |d OCLCQ  |d VT2  |d VLY  |d CZL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d EZC 
019 |a 908097539  |a 1034959165  |a 1162265515 
020 |a 9780124200593  |q (electronic bk.) 
020 |a 0124200591  |q (electronic bk.) 
020 |a 0124200540 
020 |a 9780124200548 
020 |z 9780124200548 
029 1 |a AU@  |b 000054781924 
029 1 |a AU@  |b 000054965797 
029 1 |a DEBBG  |b BV042739712 
029 1 |a DEBBG  |b BV043619467 
029 1 |a DEBSZ  |b 453330258 
035 |a (OCoLC)908041044  |z (OCoLC)908097539  |z (OCoLC)1034959165  |z (OCoLC)1162265515 
037 |a 785244  |b MIL 
050 4 |a HD38.7  |b .W56 2015eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.472  |2 23 
049 |a UAMI 
100 1 |a Wimmer, Bruce,  |e author. 
245 1 0 |a Business espionage :  |b risk, threats, and countermeasures /  |c Bruce Wimmer. 
250 |a First edition. 
264 1 |a Waltham, Massachusetts :  |b Elsevier,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (210 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Print version record. 
505 0 |a Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage. 
505 8 |a Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation. 
505 8 |a Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training. 
505 8 |a Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team. 
505 8 |a Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed. 
504 |a Includes bibliographical references and index. 
546 |a English. 
520 |a Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author's 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage. Shows how to identify a company's threats, weaknesses, and most critical assets Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats Uses real-life case studies and examples to help the reader understand how to apply the tactics discussed. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Business intelligence. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Business intelligence  |2 fast 
655 7 |a dissertations.  |2 aat 
655 7 |a Academic theses  |2 fast 
655 7 |a Academic theses.  |2 lcgft 
655 7 |a Thèses et écrits académiques.  |2 rvmgf 
758 |i has work:  |a Business espionage (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGTRMQ88vM6b4gFtmJqrmb  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Wimmer, Bruce.  |t Business espionage : risk, threats, and countermeasures.  |d Waltham, Massachusetts : Elsevier, [2015]  |z 9780124200548  |w (DLC) 18405254 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1997675  |z Texto completo 
936 |a BATCHLOAD 
938 |a Coutts Information Services  |b COUT  |n 31264687 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1997675 
938 |a ebrary  |b EBRY  |n ebr11035746 
938 |a EBSCOhost  |b EBSC  |n 970723 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31264687 
938 |a YBP Library Services  |b YANK  |n 12355066 
994 |a 92  |b IZTAP