Secrets Stolen, Fortunes Lost

Preventing Intellectual Property Theft and Economic Espionage in the 21st Century

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Secrets Stolen, Fortunes Lost by Christopher Burgess, SYNGRESS, Richard Power, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher Burgess, SYNGRESS, Richard Power ISBN: 9780080558806
Publisher: Elsevier Science Publication: August 31, 2011
Imprint: Syngress Language: English
Author: Christopher Burgess, SYNGRESS, Richard Power
ISBN: 9780080558806
Publisher: Elsevier Science
Publication: August 31, 2011
Imprint: Syngress
Language: English

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

More books from Elsevier Science

Cover of the book The Air Transport System by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Microsystems for Bioelectronics by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Joe Celko's SQL for Smarties by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Carbonate Reservoirs by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Handbook of Medical Textiles by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Veterinary Toxicology by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Soilless Culture: Theory and Practice by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Federal Cloud Computing by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Biomass, Biofuels, Biochemicals by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Gene Therapy of Cancer by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Physiology by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Metabolons and Supramolecular Enzyme Assemblies by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Advances in Imaging and Electron Physics by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Nano Optoelectronic Sensors and Devices by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Food Safety and Quality Systems in Developing Countries by Christopher Burgess, SYNGRESS, Richard Power
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy