Skip to content
Scan a barcode
Scan
Hardcover Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do about It Book

ISBN: 0761508406

ISBN13: 9780761508403

Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do about It

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Very Good

$5.99
Save $20.01!
List Price $26.00
Almost Gone, Only 3 Left!

Book Overview

There is widespread misconception in America that industrial espionage is a high-tech crime perpetrated by slick James Bond types or genius computer hackers -- not true! Every year millions of companies lose billions of dollars because their valuable information leaks out through ordinary people and simple, preventable methods.In his new book, Corporate Espionage, information security expert Ira Winkler reveals how he stole billions of dollars in...

Customer Reviews

5 ratings

Cut your security risks with effective countermeasures.

As the current Director of Technology for the National Computer Security Asociation and a former NSA agent (10+ years), Ira Winkler is 'the' individual to address this topic. According to resources such as the FBI, industrial espionage costs US corporations between 24 and 100 billion dollars every year. This book divided into three sections. Part one discusses basic espionage concepts and your companay's 'risk equation.' Spies don't care about the form in which the information they seek comes. It can be from a computer, formal or draft documents, scrap paper or internal correspondence. Aside from domestic spies, there are an estimated 100+ nations that are currently engaging in espionage against US companies. Risk level is determined by Threat x Vulnerability x Value / Countermeasures. Part two contains case studies to show how a breach occurs. One study concerns William Geade and how he stole over a billion dollars worth of information from AMD and Intel. Another study includes the author himself, who hired in (under cover) as a temp at NCC in 1995. Within 2 days Mr. Winkler had compromised 28 of the 29 top development projects exposing many breach points. Part three is titled 'What You Can Do' and goes over many effective countermeasures that you can employ right now. It is jam packed with many ideas, most of them simple, that will tighten your security. Countermeasures are broken down into four areas: Operations, Personell, Physical and Techincal. Five Stars

Excellent!!

This is a book that i would recommend to all system admins and anyone who works with networks and computers. This guy is simply amazing, all it is, being shared experiences from his job. But the tips he gives are priceless... a little social engineering here a little hacking there...BUY this book if you are a cpu afficionado and want to learn even more and protect your systems.

Computer theft is often just in the asking.

Fantastic book! Time and again Mr. Winkler shows the power of social engineering, the use of widely (and readily available)software tools and maybe a little cleverness, used seperately or in combination to foil computer security. But he goes further and in Part III identifies MANY very simple procedures (most at no additional cost) that will foil almost any attack on your computer system.

A "must read" if you value your privacy and information.

Winkler covers this extensive topic in great detail. After reading Corporate Espionage I was left with the realization that being careful and aware of the threats and vulnerabilities around us is vital in this competitive world. The countermeasures that Winkler describes can also be used in all parts of our lives, not just the corporate environment. Corporate Espionage is a "must read" for anyone interested in protecting their personal or corporate information.

A superb introduction to information security

CORPORATE ESPIONAGE should be read by everyone with critical or sensitive information assets. Ira winkler explains risk management principles in a clear manner that appeals to everyone from the smallest home based business person to the CEO's of large corporations. Business people will find the case studies interesting. Information security professionals need more technical books for specific projects; they need Winkler to help them maintain their perspective.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured