Record ID | marc_loc_updates/v36.i47.records.utf8:8901159:1635 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_updates/v36.i47.records.utf8:8901159:1635?format=raw |
LEADER: 01635nam a22002898a 4500
001 2008050648
003 DLC
005 20081120142922.0
008 081119s2009 mau 001 0 eng
010 $a 2008050648
020 $a9780750679954 (alk. paper)
040 $aDLC$cDLC
043 $an-us---
050 00 $aKF2979$b.S43 2009
082 00 $a346.7304/8$222
245 00 $aSecuring intellectual property :$bprotecting trade secrets, and other information assets.
260 $aBoston :$bButterworth-Heinemann/Syngress,$cc2009.
263 $a0811
300 $ap. cm.
500 $a"An information security reader."
500 $aIncludes index.
505 0 $aElements of a Holistic program -- Trade secrets and non-disclosure agreements -- Confidentiality, rights transfer, and non-competition agreements for employees -- IT services--development, outsourcing, and consulting -- How to sell your intellectual property protection program -- Case study: the myserious social engineering attacks on entity Y -- When insiders and/or competitors target a business's intellectual property -- When piracy, counterfeiting, and organized crime target a business's intellectual -- Property -- Physical security: the "duh" factor -- Protecting intellectual property in a crisis situation -- Top ten ways to shut down hackers.
650 0 $aIntellectual property$zUnited States$xCriminal provisions.
650 0 $aData protection$xLaw and legislation$zUnited States.
650 0 $aCopyright and electronic data processing$xLaw and legislation$zUnited States.
650 0 $aTrade secrets$zUnited States.
710 2 $aButterworth-Heinemann (Firm).