did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780398073909

The Quiet Threat

by
  • ISBN13:

    9780398073909

  • ISBN10:

    0398073902

  • Format: Paperback
  • Copyright: 2003-06-01
  • Publisher: Charles C Thomas Pub Ltd
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.95

Summary

Industrial espionage is a craft that has evolved over the centuries that remains persistent in its threat. History has shown us that the techniques used today are adaptations of those developed in the sixteenth century and honed through the twentieth century. Accordingly, the text focuses on the similarity of industrial spy craft through time with examples from Anglo-American history. This book will help security professionals to combat industrial (or corporate) espionage in the post-industrial information age by helping to understand its techniques. A primary goal of the book is in giving the reader a real sense of how industrial spies are persistent and clever in circumventing defenses.

Author Biography

Ronald L. Mendell, B.S., C.L.I.: Certified Legal Investigator Member, American Society for Industrial Security Houston, Texas

Table of Contents

Prefacep. v
Introduction
Paradox and Securityp. 3
A Brief Scenariop. 7
The Rest of the Bookp. 9
Discussionp. 11
For Further Readingp. 11
The Factory Visit (Observation)p. 12
McDonnell Douglas 1993p. 15
Tredegar Iron Works 1861p. 17
Lowell National Historical Parkp. 18
Discussionp. 20
Observation (Exercises)p. 23
For Further Readingp. 24
Knowledgep. 25
Trees and Seedsp. 29
Technical Intelligencep. 32
Francis Bacon, Prophet of Economic Intelligence Gatheringp. 34
SQL and Data Miningp. 36
Discussionp. 38
For Further Readingp. 39
Beginnings in Englandp. 40
British Industrialism in the Eighteenth and Nineteenth Centuriesp. 43
Other Lessonsp. 46
Discussionsp. 47
For Further Readingp. 49
More Observation Techniquesp. 50
Computer Systemsp. 53
Mobile Computingp. 57
Electronic Eavesdroppingp. 60
Infiltrationp. 62
Sales Forcep. 62
Trash Raidingp. 64
Public Recordsp. 64
Cloakingp. 65
Discussionp. 66
For Further Readingp. 67
Multi-Line Techniquesp. 68
Sources of Informationp. 69
Brainstormingp. 75
Foreign Spiesp. 79
Targets and Trendsp. 80
Discussionp. 81
Power and Politicsp. 82
Briberyp. 85
Disinformationp. 88
Trade Secret Theftp. 89
University Research Ployp. 91
Patentsp. 92
Ruses and Deceptionp. 93
What the Vietnam War Taught Usp. 95
Discussionp. 97
Countermeasuresp. 99
The Information Predatorp. 100
Road Mapsp. 106
A Word about Computer Securityp. 108
Discussionp. 110
For Further Readingp. 110
Internal Intelligencep. 111
The Information Predator Continuesp. 111
More Trainingp. 117
Discussionp. 125
External Intelligencep. 127
Building Intelligence Resourcesp. 131
Discussionp. 140
Investigating Casesp. 141
Investigative Checklistp. 144
A Word about Civil Casesp. 152
Background Investigationsp. 153
Discussionp. 155
Chapter Notesp. 157
Master Checklistp. 167
Chronologyp. 185
Bibliographyp. 187
Indexp. 193
Table of Contents provided by Rittenhouse. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program