search for books and compare prices
Tables of Contents for Netspionage
Chapter/Section Title
Page #
Page Count
Foreword
ix
 
Preface
xiii
 
Acknowledgments
xix
 
Section I: How Did We Get Here?
1
62
Introduction to the New Old World
3
8
The Driving Force: High-Technology
11
6
The Internet: The Global I-Way to Netspionage and Techno-Crime
17
12
The Global Business and Government Revolutions
29
18
A Short History of Espionage: Industrial, Economic, and Military
47
16
Section II: Who Does What to Whom, Why and How
63
78
Competitive Intelligence and the Networked World
65
16
Information Collection in the Gray Zone
81
 
The Black Zone, Who Uses Netspionage, How and Why
9
108
Case Studies of Netspionage
117
24
Section III: Protecting What You Have from Those Who Want It
141
48
Defending Against Netspionage
143
18
Operational Security and Risk Management Techniques to Mitigate the Netspionage Threat
161
18
The Best Defense May Really Be a Good Offense and Other Issues
179
10
Section IV: Based on Where We Have Been and Where We Are Now, Where Are We Going?
189
62
Future of Technology
191
10
Business, Crime, and Security in the 21st Century Global Marketplace
201
10
Future Netspionage
211
16
Businesses and Government Agencies---Shared Responsibilities
227
8
Epilog: We're All In This Together
235
16
Appendices
Appendix 1 The Economic Espionage Act of 1996
241
8
Appendix 2 About the Authors
249
2
Index
251