Secrets Stolen, Fortunes Lost

Preventing Intellectual Property Theft and Economic Espionage in the 21st Century

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Secrets Stolen, Fortunes Lost by Christopher Burgess, SYNGRESS, Richard Power, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher Burgess, SYNGRESS, Richard Power ISBN: 9780080558806
Publisher: Elsevier Science Publication: August 31, 2011
Imprint: Syngress Language: English
Author: Christopher Burgess, SYNGRESS, Richard Power
ISBN: 9780080558806
Publisher: Elsevier Science
Publication: August 31, 2011
Imprint: Syngress
Language: English

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

More books from Elsevier Science

Cover of the book Rehabilitation Robotics by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Fine Sediment Dynamics in the Marine Environment by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book The Gaseous State by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Measuring Ocean Currents by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Advances in Agronomy by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Thermal and Moisture Transport in Fibrous Materials by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book The Biogeography of the Australian North West Shelf by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Networks-on-Chip by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Offshore Operation Facilities by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Fluoroplastics, Volume 1 by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Aquatic Ecotoxicology by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Hurricane Generated Seas by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Advances in Technical Nonwovens by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Alan Turing: His Work and Impact by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Coastal Plant Communities of Latin America by Christopher Burgess, SYNGRESS, Richard Power
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy