Business Intellingence and Corporate Espionage
Autor Steve Martinen Limba Engleză Paperback – 15 sep 2025
Preț: 398.73 lei
Preț vechi: 458.30 lei
-13% Nou
Puncte Express: 598
Preț estimativ în valută:
76.31€ • 79.27$ • 63.39£
76.31€ • 79.27$ • 63.39£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780132331425
ISBN-10: 013233142X
Pagini: 720
Dimensiuni: 178 x 254 mm
Greutate: 1 kg
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Upper Saddle River, United States
ISBN-10: 013233142X
Pagini: 720
Dimensiuni: 178 x 254 mm
Greutate: 1 kg
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Upper Saddle River, United States
Cuprins
ONE
Introduction to Business Intelligence and Corporate Espionage
TWO
Overt Methodologies
THREE
Covert Methodologies
FOUR
Legal Issues
FIVE
Threats
SIX
Financial Considerations
SEVEN
Risk Assessment
EIGHT
Security Planning
NINE
Counter Measures
TEN
Ethics
ELEVEN
Governmental Support to Corporations
TWELVE
Creating a Business Intelligence Capability
APPENDIX A: A COMPANION TO CHAPTER 1
While American Sleeps
APPENDIX B
Technology Collection Trends in the U.S. Defense Industry 2002
APPENDIX C: THREATS-COMPANION TO CHAPTER 5
Are Corporate Information Assets, in the Midst of Dynamic Technological and Infrastructural Advances, Best Secured by Legal of Self-Help Remedies?
APPENDIX D: COMPUTER SECURITY ISSUES-COMPANION TO CHAPTER 8
Excerpt from Computer Security for the Home and Small Office
APPENDIX E
The Language of Business Intelligence
APPENDIX F
Network Intrusion
APPENDIX G
Practices for Securing Critical Information Assets
APPENDIX H
CI Online Information Services
APPENDIX I: POWERPOINT PRESENTATION
The Competitive Intelligence and National Security Threat from Website Job Postings
APPENDIX J
Homeland Security Program Development Team
Introduction to Business Intelligence and Corporate Espionage
TWO
Overt Methodologies
THREE
Covert Methodologies
FOUR
Legal Issues
FIVE
Threats
SIX
Financial Considerations
SEVEN
Risk Assessment
EIGHT
Security Planning
NINE
Counter Measures
TEN
Ethics
ELEVEN
Governmental Support to Corporations
TWELVE
Creating a Business Intelligence Capability
APPENDIX A: A COMPANION TO CHAPTER 1
While American Sleeps
APPENDIX B
Technology Collection Trends in the U.S. Defense Industry 2002
APPENDIX C: THREATS-COMPANION TO CHAPTER 5
Are Corporate Information Assets, in the Midst of Dynamic Technological and Infrastructural Advances, Best Secured by Legal of Self-Help Remedies?
APPENDIX D: COMPUTER SECURITY ISSUES-COMPANION TO CHAPTER 8
Excerpt from Computer Security for the Home and Small Office
APPENDIX E
The Language of Business Intelligence
APPENDIX F
Network Intrusion
APPENDIX G
Practices for Securing Critical Information Assets
APPENDIX H
CI Online Information Services
APPENDIX I: POWERPOINT PRESENTATION
The Competitive Intelligence and National Security Threat from Website Job Postings
APPENDIX J
Homeland Security Program Development Team