![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
This book begins by laying out a history of espionage that clearly
shows that when a new technology or technique becomes available to
the information gatherers in public and private sectors, they can
quickly be adopted for Netspionage use. It then moves on to
describe how the Internet and associated technologies have already
revolutionized the collection and analysis of competitive
information. The convergence of dependency on networked and
exploitation tools (often propagated by "hackers," "cyberpunks,"
and even intelligence agencies) has already resulted in several
incidents that foreshadow the perilous future. Close study of these
incidents demonstrates how difficult yet how important it is to
confront the challenges of "netspionage" and its less intrusive
cousins. The authors present a set of the known incidents and then
outline protective measures that will reduce the potential and
consequences of netspionage.
|
You may like...
Eigenvalue and Eigenvector Problems in…
Sorin Vlase, - Marin Marin, …
Hardcover
R3,806
Discovery Miles 38 060
Differential Equations with Linear…
Matthew R. Boelkins, Jack L. Goldberg, …
Hardcover
R2,869
Discovery Miles 28 690
A Brief Guide to Algebraic Number Theory
H. P. F. Swinnerton-Dyer
Hardcover
R3,298
Discovery Miles 32 980
|