Secrets of Computer Espionage: Tactics and Countermeasures

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government

• Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals

• Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes

• Companion Web site contains links to security tools and useful security information resources

1101200838
Secrets of Computer Espionage: Tactics and Countermeasures

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government

• Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals

• Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes

• Companion Web site contains links to security tools and useful security information resources

40.0 In Stock
Secrets of Computer Espionage: Tactics and Countermeasures

Secrets of Computer Espionage: Tactics and Countermeasures

by Joel McNamara
Secrets of Computer Espionage: Tactics and Countermeasures

Secrets of Computer Espionage: Tactics and Countermeasures

by Joel McNamara

Paperback

$40.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government

• Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals

• Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes

• Companion Web site contains links to security tools and useful security information resources


Product Details

ISBN-13: 9780764537103
Publisher: Wiley
Publication date: 06/20/2003
Pages: 384
Product dimensions: 7.44(w) x 9.20(h) x 0.90(d)

About the Author

Joel McNamara is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.

Read an Excerpt

Click to read or download

Table of Contents

Acknowledgments.

Introduction.

Chapter 1: Spies.

Chapter 2: Spying and the Law.

Chapter 3: Black Bag Jobs.

Chapter 4: Breaching the System.

Chapter 5: Searching for Evidence.

Chapter 6: Unprotecting Data.

Chapter 7: Copying Data.

Chapter 8: Snooping with Keyloggers.

Chapter 9: Spying with Trojan Horses.

Chapter 10: Network Eavesdropping.

Chapter 11: 802.11b Wireless Network Eavesdropping.

Chapter 12: Spying on Electronic Devices.

Chapter 13: Advanced Computer Espionage.

Appendix A: What's on the Web Site.

Index.

From the B&N Reads Blog

Customer Reviews