Business espionage : risks, threats, and countermeasures /

Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully exp...

Full description

Saved in:
Bibliographic Details
Main Author: Wimmer, Bruce (Author)
Format: Electronic eBook
Language:English
Published: Waltham, MA : Butterworth-Heinemann, 2015.
Subjects:
Online Access:CONNECT
CONNECT

MARC

LEADER 00000cam a2200000 i 4500
001 in00006065502
006 m o d
007 cr cnu---unuuu
008 150401s2015 mau ob 001 0 eng d
005 20240708165619.0
019 |a 910165558  |a 931604029  |a 1105174250  |a 1105567685 
020 |a 9780124200593 
020 |a 0124200591 
020 |z 9780124200548 
035 |a 1WRLDSHRocn905979862 
035 |a (OCoLC)905979862  |z (OCoLC)910165558  |z (OCoLC)931604029  |z (OCoLC)1105174250  |z (OCoLC)1105567685 
037 |a CL0500000595  |b Safari Books Online 
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d YDXCP  |d OCLCF  |d U3W  |d D6H  |d ABC  |d UMI  |d UKMGB  |d LQU  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB  |d OCLCQ  |d OCLCO 
049 |a TXMM 
050 4 |a HD38.7 
082 0 4 |a 658.4/7  |2 23 
100 1 |a Wimmer, Bruce,  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjxhj6VyQMFmqW8fVTbRPP 
245 1 0 |a Business espionage :  |b risks, threats, and countermeasures /  |c Bruce Wimmer, CPP. 
264 1 |a Waltham, MA :  |b Butterworth-Heinemann,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
520 |a Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author's 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage. 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed April 1, 2015). 
504 |a Includes bibliographical references and index. 
500 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access)  |5 TMurS 
500 |a ScienceDirect eBook - Forensics, Security, and Criminal Justice 2015  |5 TMurS 
650 0 |a Business intelligence. 
650 0 |a Confidential business information. 
730 0 |a WORLDSHARE SUB RECORDS 
758 |i has work:  |a Business espionage (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGTRMQ88vM6b4gFtmJqrmb  |4 https://id.oclc.org/worldcat/ontology/hasWork 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780124200548/?ar  |z CONNECT  |3 O'Reilly  |t 0 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://www.sciencedirect.com/science/book/9780124200548  |z CONNECT  |3 Elsevier  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 0a221af6-fc10-46e9-9239-29a61686ea7b  |i 563257c5-8b02-4d37-828d-35674ccc2afb  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e HD38.7   |h Library of Congress classification