Secrets of Computer Espionage: Tactics and Countermeasures
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Secrets of Computer Espionage: Tactics and Countermeasures

English

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government
* Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals
* Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes
* Companion Web site contains links to security tools and useful security information resources

English

Joel McNamara is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.

English

Acknowledgments.

Introduction.

Chapter 1: Spies.

Chapter 2: Spying and the Law.

Chapter 3: Black Bag Jobs.

Chapter 4: Breaching the System.

Chapter 5: Searching for Evidence.

Chapter 6: Unprotecting Data.

Chapter 7: Copying Data.

Chapter 8: Snooping with Keyloggers.

Chapter 9: Spying with Trojan Horses.

Chapter 10: Network Eavesdropping.

Chapter 11: 802.11b Wireless Network Eavesdropping.

Chapter 12: Spying on Electronic Devices.

Chapter 13: Advanced Computer Espionage.

Appendix A: What's on the Web Site.

Index.

English

“…provides insightful details backed up by a wealth of real-life examples….clearly a valuable addition to your bookshelf…” (www.net-security.org, May 2004)

“…surprisingly clear given the degree of difficulty of his topic,…we suggest this practical book top managers…” (www.getabstract.com, May 2004)

"…an informative book which should help keep those defences up and those intruders out…" (PC Utilities, No.39, 2003)

“…will definitely open your eyes…quirky case studies and good coverage of latest technology…” (Internetworks, November 2003)

“…informative…entertaining…next time you go to your local bookseller, locate a copy. I bet you’ll be hooked…” (Linux Journal, 22 August 2003)

loading