Secrets of Computer Espionage: Tactics and Countermeasures
Course
Distance
Description
-
Type
Course
-
Methodology
Distance Learning
Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government
Reviews
Course programme
Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government
Program
Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government.
Key Features:
- Author shares easily-implemented counter measures against spying to detect and defeat eavesdroppers and other hostile individuals
- Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes
- Companion Web site contains links to security tools and useful security information resources
Publisher: John Wiley
Format: Soft Cover
ISBN 10: 0764537105
ISBN 13: 9780764537103
Published: June 2003
Availability: In Stock
Order today for fast despatch.
Secrets of Computer Espionage: Tactics and Countermeasures