Securing Intellectual Property

Protecting Trade Secrets and Other Information Assets

Nonfiction, Reference & Language, Law, Intellectual Property, Business & Finance, Industries & Professions, Information Management
Cover of the book Securing Intellectual Property by Information Security, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Information Security ISBN: 9780080941417
Publisher: Elsevier Science Publication: December 9, 2008
Imprint: Butterworth-Heinemann Language: English
Author: Information Security
ISBN: 9780080941417
Publisher: Elsevier Science
Publication: December 9, 2008
Imprint: Butterworth-Heinemann
Language: English

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers

Sample agreements and forms that address specific business needs

Coverage of threats ranging from physical security lapses to hackers to social engineering

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers

Sample agreements and forms that address specific business needs

Coverage of threats ranging from physical security lapses to hackers to social engineering

More books from Elsevier Science

Cover of the book Linear Algebra by Information Security
Cover of the book Skin Tissue Models by Information Security
Cover of the book Functional Ingredients from Algae for Foods and Nutraceuticals by Information Security
Cover of the book Advances in Atomic, Molecular, and Optical Physics by Information Security
Cover of the book MPEG-V by Information Security
Cover of the book Pulp and Paper Industry by Information Security
Cover of the book Biomolecular Spectroscopy: Advances from Integrating Experiments and Theory by Information Security
Cover of the book The Microbiology of Respiratory System Infections by Information Security
Cover of the book Advances in Clinical Chemistry by Information Security
Cover of the book Digital Signal Processing by Information Security
Cover of the book Chemistry of Advanced Environmental Purification Processes of Water by Information Security
Cover of the book Handbook of Thermal Analysis and Calorimetry by Information Security
Cover of the book Functional Inequalities Markov Semigroups and Spectral Theory by Information Security
Cover of the book Basic and Applied Bone Biology by Information Security
Cover of the book Integrated Analytical Approaches for Pesticide Management by Information Security
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy