Business espionage : risks, threats, and countermeasures /
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully exp...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Waltham, MA :
Butterworth-Heinemann,
2015.
|
Subjects: | |
Online Access: | CONNECT CONNECT |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | in00006065502 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 150401s2015 mau ob 001 0 eng d | ||
005 | 20240708165619.0 | ||
019 | |a 910165558 |a 931604029 |a 1105174250 |a 1105567685 | ||
020 | |a 9780124200593 | ||
020 | |a 0124200591 | ||
020 | |z 9780124200548 | ||
035 | |a 1WRLDSHRocn905979862 | ||
035 | |a (OCoLC)905979862 |z (OCoLC)910165558 |z (OCoLC)931604029 |z (OCoLC)1105174250 |z (OCoLC)1105567685 | ||
037 | |a CL0500000595 |b Safari Books Online | ||
040 | |a OPELS |b eng |e rda |e pn |c OPELS |d YDXCP |d OCLCF |d U3W |d D6H |d ABC |d UMI |d UKMGB |d LQU |d S2H |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
049 | |a TXMM | ||
050 | 4 | |a HD38.7 | |
082 | 0 | 4 | |a 658.4/7 |2 23 |
100 | 1 | |a Wimmer, Bruce, |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjxhj6VyQMFmqW8fVTbRPP | |
245 | 1 | 0 | |a Business espionage : |b risks, threats, and countermeasures / |c Bruce Wimmer, CPP. |
264 | 1 | |a Waltham, MA : |b Butterworth-Heinemann, |c 2015. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
590 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | ||
520 | |a Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author's 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage. | ||
500 | |a Includes index. | ||
588 | 0 | |a Online resource; title from PDF title page (ScienceDirect, viewed April 1, 2015). | |
504 | |a Includes bibliographical references and index. | ||
500 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) |5 TMurS | ||
500 | |a ScienceDirect eBook - Forensics, Security, and Criminal Justice 2015 |5 TMurS | ||
650 | 0 | |a Business intelligence. | |
650 | 0 | |a Confidential business information. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
758 | |i has work: |a Business espionage (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGTRMQ88vM6b4gFtmJqrmb |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780124200548/?ar |z CONNECT |3 O'Reilly |t 0 |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://www.sciencedirect.com/science/book/9780124200548 |z CONNECT |3 Elsevier |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s 0a221af6-fc10-46e9-9239-29a61686ea7b |i 563257c5-8b02-4d37-828d-35674ccc2afb |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e HD38.7 |h Library of Congress classification |