![]() |
![]() |
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
This book begins by laying out a history of espionage that clearly
shows that when a new technology or technique becomes available to
the information gatherers in public and private sectors, they can
quickly be adopted for Netspionage use. It then moves on to
describe how the Internet and associated technologies have already
revolutionized the collection and analysis of competitive
information. The convergence of dependency on networked and
exploitation tools (often propagated by "hackers," "cyberpunks,"
and even intelligence agencies) has already resulted in several
incidents that foreshadow the perilous future. Close study of these
incidents demonstrates how difficult yet how important it is to
confront the challenges of "netspionage" and its less intrusive
cousins. The authors present a set of the known incidents and then
outline protective measures that will reduce the potential and
consequences of netspionage.
|
![]() ![]() You may like...
Faces from the Interior - The North…
Toby Jurovics, Scott Manning Stevens, …
Hardcover
The Gift of Who I Am - Living Prayer…
Christine Black Cummings
Paperback
World War II Rhode Island
Christian McBurney, Brian L Wallin, …
Paperback
Nanotechnology for the Preparation of…
Siti Hamidah Mohd Setapar, Akil Ahmad, …
Paperback
R4,593
Discovery Miles 45 930
Bletchley Park - The Secret Archives
Sinclair McKay, Bletchley Park
Hardcover
![]()
Changing Fashion - A Critical…
Annette Lynch, Mitchell Strauss
Hardcover
R4,232
Discovery Miles 42 320
|