This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation...
Related Subjects
Business Business & Finance Business & Investing Business & Management Computer Science Computers Computers & Technology Culture Encryption Engineering Hacking Industries & Professions Information Management Internet, Groupware, & Telecommunications Manager's Guides to Computing Network Security Networking Security & Encryption Textbooks