Secrets of Computer Espionage: Tactics and Countermeasures / Edition 1

Secrets of Computer Espionage: Tactics and Countermeasures / Edition 1

by Joel McNamara
ISBN-10:
0764537105
ISBN-13:
9780764537103
Pub. Date:
06/20/2003
Publisher:
Wiley
ISBN-10:
0764537105
ISBN-13:
9780764537103
Pub. Date:
06/20/2003
Publisher:
Wiley
Secrets of Computer Espionage: Tactics and Countermeasures / Edition 1

Secrets of Computer Espionage: Tactics and Countermeasures / Edition 1

by Joel McNamara

Paperback

$40.0
Current price is , Original price is $40.0. You
$40.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government

• Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals

• Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes

• Companion Web site contains links to security tools and useful security information resources


Product Details

ISBN-13: 9780764537103
Publisher: Wiley
Publication date: 06/20/2003
Pages: 384
Product dimensions: 7.44(w) x 9.20(h) x 0.90(d)

About the Author

Joel McNamara is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.

Read an Excerpt

Click to read or download

Table of Contents

Acknowledgments.

Introduction.

Chapter 1: Spies.

Chapter 2: Spying and the Law.

Chapter 3: Black Bag Jobs.

Chapter 4: Breaching the System.

Chapter 5: Searching for Evidence.

Chapter 6: Unprotecting Data.

Chapter 7: Copying Data.

Chapter 8: Snooping with Keyloggers.

Chapter 9: Spying with Trojan Horses.

Chapter 10: Network Eavesdropping.

Chapter 11: 802.11b Wireless Network Eavesdropping.

Chapter 12: Spying on Electronic Devices.

Chapter 13: Advanced Computer Espionage.

Appendix A: What's on the Web Site.

Index.

From the B&N Reads Blog

Customer Reviews