| Record ID | harvard_bibliographic_metadata/20220215_003.bib.mrc:207826614:2996 |
| Source | Harvard University |
| Download Link | /show-records/harvard_bibliographic_metadata/20220215_003.bib.mrc:207826614:2996?format=raw |
LEADER: 02996cam a22003018a 4500
005 20020606104010.5
008 000413s2000 mau 001 0 eng
001 990084766560203941
010 $a^^^00039832^
020 $a0750672579 (paper : alk. paper)$0(uri) http://www.isbnsearch.org/isbn/0750672579
035 $a(OCoLC)43919837$0(uri) http://www.worldcat.org/oclc/43919837
040 $aDLC$cDLC
042 $apcc
050 00 $aHV6773$b.B665 2000
082 00 $a364.16/8$221
100 1 $aBoni, William C.$0(uri) http://id.loc.gov/authorities/names/n99000839$0(uri) http://viaf.org/viaf/sourceID/LC|n99000839
245 10 $aNetspionage :$bthe global threat to information /$cWilliam Boni, Gerald L. Kovacich.
260 $aBoston :$bButterworth-Heinemann,$c2000.
300 $axx, 260 p. :$bill. ;$c24 cm.
500 $aIncludes index.
505 00 $tHow Did We Get Here? --$tIntroduction to the New Old World --$tThe Driving Force: High-Technology --$tThe Internet: The Global I-Way to Netspionage and Techno-Crime --$tThe Global Business and Government Revolutions --$tA Short History of Espionage: Industrial, Economic, and Military --$tWho Does What to Whom, Why and How --$tCompetitive Intelligence and the Networked World --$tInformation Collection in the Gray Zone --$tThe Black Zone, Who Uses Netspionage, How and Why --$tCase Studies of Netspionage --$tProtecting What You Have from Those Who Want It --$tDefending Against Netspionage --$tOperational Security and Risk Management Techniques to Mitigate the Netspionage Threat --$tThe Best Defense May Really Be a Good Offense and Other Issues --$tBased on Where We Have Been and Where We Are Now, Where Are We Going? --$tFuture of Technology --$tBusiness, Crime, and Security in the 21st Century Global Marketplace --$tFuture Netspionage --$tBusinesses and Government Agencies--Shared Responsibilities --$tEpilog: We're All In This Together --$tThe Economic Espionage Act of 1996.
520 1 $a"Netspionage raises awareness and understanding of the problems and concerns regarding the protection of sensitive corporate and government information. This book can be of significant benefit to businesses, government agencies, the legal community, security professionals, law enforcement, and others by explaining the problems and then showing how to protect against criminals, terrorists, and intelligence agencies who exploit the new "cyber world.""--Jacket.
650 0 $aComputer crimes.$0(uri) http://id.loc.gov/authorities/subjects/sh85029492
650 0 $aComputer security$0(uri) http://id.loc.gov/authorities/subjects/sh90001862
650 0 $aInternet.$0(uri) http://id.loc.gov/authorities/subjects/sh92002816
700 1 $aKovacich, Gerald L.$0(uri) http://id.loc.gov/authorities/names/no98094583$0(uri) http://viaf.org/viaf/sourceID/LC|no98094583
852 0 $bBAK$cSTLC$hHV6773$i.B665 2000$8222057955120003941
876 $8222057955120003941$q1$70$mSTLC$yBOOK$pHBAETS$cSTLC$0232057955110003941$h01$nHV6773 .B665 2000$bBAK$lBAK