Secrets Stolen, Fortunes Lost

Preventing Intellectual Property Theft and Economic Espionage in the 21st Century

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Secrets Stolen, Fortunes Lost by Christopher Burgess, SYNGRESS, Richard Power, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher Burgess, SYNGRESS, Richard Power ISBN: 9780080558806
Publisher: Elsevier Science Publication: August 31, 2011
Imprint: Syngress Language: English
Author: Christopher Burgess, SYNGRESS, Richard Power
ISBN: 9780080558806
Publisher: Elsevier Science
Publication: August 31, 2011
Imprint: Syngress
Language: English

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

More books from Elsevier Science

Cover of the book High Performance Polymers by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Contourites by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Performance Testing of Textiles by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Agriculture to Zoology by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book The Basics of Cloud Computing by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Animal Creativity and Innovation by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Land and Marine Hydrogeology by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Progress in Optics by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Object-Oriented Analysis and Design for Information Systems by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Inflammation in Heart Failure by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Energy from Waste by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book The Finite Element Method: Its Basis and Fundamentals by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Soft Computing and Intelligent Systems by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Multiple Equilibria in Proteins by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Groups - Modular Mathematics Series by Christopher Burgess, SYNGRESS, Richard Power
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy