Record ID | ia:secretsstolenfor0000burg |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/secretsstolenfor0000burg/secretsstolenfor0000burg_marc.xml |
Download MARC binary | https://www.archive.org/download/secretsstolenfor0000burg/secretsstolenfor0000burg_meta.mrc |
LEADER: 02591nam 2200349Ia 4500
001 9919602470001661
005 20150423121525.0
008 080204s2008 maua 001 0 eng
019 $a182656699
020 $a9781597492553 (pbk.)
020 $a1597492558 (pbk.)
035 $a(CSdNU)u325079-01national_inst
035 $a(OCoLC)191891048
035 $a(OCoLC)191891048
035 $a(OCoLC)191891048$z(OCoLC)182656699
040 $aUKM$cUKM$dYDXCP$dBAKER$dBTCTA$dBWX$dOrLoB-B
049 $aCNUM
050 0 $aHV6773$b.B87 2008
082 04 $a658.472$222
100 1 $aBurgess, Christopher.
245 10 $aSecrets stolen, fortunes lost :$bpreventing intellectual property theft and economic espionage in the 21st century /$cby Christopher Burgess, Richard Power.
260 $aBurlington, MA :$bSyngress,$cc2008.
300 $axx, 357 p. :$bill. ;$c24 cm.
500 $aIncludes index.
505 0 $aPt. 1. The Challenge -- Ch. 1. The Tale of the Targeted Trojan -- Ch. 2. When Insiders and/or Competitors Target a Business's Intellectual Property -- Ch. 3. When State Entities Target a Business's Intellectual Property -- Ch. 4. When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property -- Ch. 5. Virtual Roundtable on Intellectual Property and Economic Espionage -- Pt. 2. The Strategy -- Ch. 6. Elements of a Holistic Program -- Ch. 7. Case Study: Cisco's Award-Winning Awareness Program -- Ch. 8. Case Study: A Bold New Approach in Awareness and Education Meets an Ignoble Fate -- Ch. 9. Case Study: The Mysterious Social Engineering Attacks on Entity Y -- Ch. 10. Personnel Security -- Ch. 11. Physical Security: The "Duh" Factor -- Ch. 12. Information Security -- Ch. 13. The Intelligent Approach -- Ch. 14. Protecting Intellectual Property in a Crisis Situation -- Ch. 15. How to Sell Your Intellectual Property Protection Program -- Ch. 16. Conclusion -- App. A. Baseline Controls for Information Security Mapped to ISO -- App. B. Leveraging Your Tax Dollar -- App. C. Notes on Cyber Forensics -- App. D. U.S. International Trade Commission Section 337 Process -- App. E. U.S. Trade Representative's 2007 Special 301 Watch List -- App. F. U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense.
650 0 $aComputer crimes.
650 0 $aIntellectual property infringement.
650 0 $aBusiness intelligence.
650 0 $aIntellectual capital$xManagement.
700 1 $aPower, Richard.
994 $aC0$bCNU
999 $aHV 6773 .B87 2008$wLC$c1$i31786102403943$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u4/28/2008