This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by 'hackers', 'cyberpunks', and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of 'netspionage' and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage. Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise. This is a practical guide written from front-line experience. It explains the evolution of information collection and why it has never been easier. It highlights the tools of the trade and how they can be put to best use.
评分
评分
评分
评分
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 qciss.net All Rights Reserved. 小哈图书下载中心 版权所有