Netspionage: The Global Threat to Information / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (11) from $1.99   
  • New (4) from $31.33   
  • Used (7) from $1.99   

Overview

This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.

Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.



*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use

Audience: Information security professionals and security managers.

Read More Show Less

Editorial Reviews

From the Publisher
This is a very well prepared and argumented book.
-Information Security Bulletin

This book is sober, well researched and well written. The authors completely avoid the sensationalism that is almost a trademark when it comes to media treatment of cyber-crime - and they must be forgiven for riding their political hobby-horses here and there, after all, facts should be presented so as to engender debate. -Information Security Bulletin

Highly recommended -please read it, give it to your boss and your MP! -Information Security Bulletin

Well-researched and detailed, the book is highly readable, and it will hold the attention of everyone from the professional security manager and the corporate executive to the casual reader. The information, sources, and statistics in this book are invaluable to any security manager who needs to sell management on the need for and process of protecting electronic assets, digital intellectual property, and proprietary information. -Security Management

In Netspionage: The Global Threat To Information, William Boni and Gerald Kovacich draw upon their many years of professional experience in corporate security and intelligence to describe and address Internet-based threats to information security. Very highly recommended, essential reading for anyone charged with corporate, government, or personal information security in this age of cyberspace hackers, terrorists, and espionage, Netspionage is a very practical and experience-based guide to the evolution of information collection and how to best protect and secure information from unwarranted and criminal attempts to access and corrupt corporate records, databases, projects, and trade secrets. - Midwest Book Review

Bill Boni and his co-author have been writing together for years and it shows. The book is smooth and informative. The book is worth reading. - Info Security News

Netspionage makes fascinating reading. It also has a lot to offer in the facts and experience departments. Boni and Kovacich have been around a long time and have been to many places and done a number of things. I'm glad they've chosen to write books such as this, thereby helping us to understand the risks that we have to live with daily in the computer and Internet world - Info Security News

Booknews
As the Internet has evolved from an academic playground to an arena of global commerce, say Boni, in information protection, and Kovacich, in security, spies have wriggled out from under the bed and into the PC. They highlight the dangers to governments, companies, and professions and explain how to protect against criminals, terrorists, and intelligence agencies. Annotation c. Book News, Inc., Portland, OR (booknews.com)
From The Critics
In Netspionage: The Global Threat To Information, William Boni and Gerald Kovacich draw upon there many years of professional experience in corporate security and intelligence to describe and address Internet-based threats to information security. Very highly recommended, essential reading for anyone charged with corporate, government, or personal information security in this age of cyberspace hackers, terrorists, and espionage, Netspionage is a very practical and experience-based guide to the evolution of information collection and how to best protect and secure information from unwarranted and criminal attempts to access and corrupt corporate records, databases, projects, and trade secrets.
Read More Show Less

Product Details

  • ISBN-13: 9780750672573
  • Publisher: Elsevier Science
  • Publication date: 9/25/2000
  • Edition number: 1
  • Pages: 280
  • Sales rank: 1,328,822
  • Product dimensions: 0.60 (w) x 6.14 (h) x 9.21 (d)

Meet the Author

Dr. Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security experience in both government as a special agent and as a manager in international corporations. Dr. Kovacich currently resides on an island in Washington state where he continues to write, lecture and conduct research relative to information systems security, information warfare defensive and offensive operations, high-technology crime and techno-terrorism.

Read More Show Less

Table of Contents

How Did We Get Here: Introduction to the New Old World; The Driving Force: High Technology; The Internet; The Global I-Way to Netspionage and Techno-Crime; The Global Business and Government Revolutions; A Short History of Espionage: Industrial, Economic, and Military; Who Does What to Whom and How: Competitive Intelligence and the Networked World; Information Collection in the Gray Zone; The Black Zone, Who Uses Netspionage, How and Why; Case Studies in Netspionage; Protecting What You Have from Those Who Want It: Defending Against Netspionage; Operational Security and Risk Management Techniques to Mitigate the Netspionage Threat; The Best Defense May Really Be a Good Offense and Other Issues; Based on Where We Have Been and Where We Are Now, Where Are We Going?: Future of Technology; Business, Crime, and Security in the 21st Century Global Marketplace; Future Netspionage; Business and Government Agencies - Shared Responsibilities; Epilog: We're All In This Together

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)