Secrets Stolen, Fortunes Lost

Preventing Intellectual Property Theft and Economic Espionage in the 21st Century

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Secrets Stolen, Fortunes Lost by Christopher Burgess, SYNGRESS, Richard Power, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher Burgess, SYNGRESS, Richard Power ISBN: 9780080558806
Publisher: Elsevier Science Publication: August 31, 2011
Imprint: Syngress Language: English
Author: Christopher Burgess, SYNGRESS, Richard Power
ISBN: 9780080558806
Publisher: Elsevier Science
Publication: August 31, 2011
Imprint: Syngress
Language: English

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

More books from Elsevier Science

Cover of the book Atlas of Mycobacterium Tuberculosis by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Architecture and Patterns for IT Service Management, Resource Planning, and Governance by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Introduction to Emergency Management by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Fuel Cells by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book The Chorleywood Bread Process by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Research Methods in Human-Computer Interaction by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Eleventh Hour CISSP by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Performance and Improvement of Green Construction Projects by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Laterality by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Benders’ Dictionary of Nutrition and Food Technology by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Consumer Driven Cereal Innovation by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Biosensors for Medical Applications by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Biotechnology of Metals by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Advances in Heterocyclic Chemistry by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Advanced Well Completion Engineering by Christopher Burgess, SYNGRESS, Richard Power
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy