Skip to content
Scan a barcode
Scan
Paperback Secrets of Computer Espionage: Tactics and Countermeasures Book

ISBN: 0764537105

ISBN13: 9780764537103

Secrets of Computer Espionage: Tactics and Countermeasures

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$5.49
Save $34.51!
List Price $40.00
Almost Gone, Only 2 Left!

Book Overview

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk... This description may be from another edition of this product.

Customer Reviews

4 ratings

Highly Recommended!

You and your computer face a dizzying array of security threats, writes tech consultant Joel McNamara. Competitors, cops, crooks and even disgruntled kin would love a peek at your hard drive. But don't hyperventilate just yet. If you calmly analyze the desirability and vulnerability of your secrets, you can figure out how to protect yourself. McNamara's prose is surprisingly clear given the degree of difficulty of his topic, and he offers a number of useful sidebars, charts and examples from inside the tech business to juice up his instructional tome. We suggest this practical book to managers charged with protecting corporate data, and to people who are unsure just how safe their computers are.

Wow! Absolutely a great, great book!

Joel McNamara's book is one of the very, very, few books that I classify as a "Must Read" for anyone involved in business or technology. This book does an amazing job of avoiding the "paranoia for paranoia's sake" tone seen so often in computer security books while still taking the issues seriously and discussing them intellegently. The conversational tone is fun and often quite funny while not making the user feel talked down to. And Mr. McNamara does an equally great job of explaining very complex topics in way that works for both extremely sophisticated computer technology professionals and non-techies alike. I've brought this book around for side-discussions in the seminars I've given since it came out and my students, ranging from small business owners to 30+ year professional tech veterans in Fortune 50s have learned new and important lessons from it. For a book to address all these audiences is rare. For a book to succeed and be invaluable for all of them is virtually unheard of. This book succeeds amazingly well.I've not only read the book through in one sitting, I keep referring back to it and it's incredibly useful web site on a regular basis.Joel, thank you for writing one of the key books of the year!

Informative and practical, plus a fun read

As co-owner of a small business I read "Secrets of Computer Espionage" with interest, particularly since I thought that running a firewall and virus protection made my system fairly safe from intrusion. Hardly.Consider the book required reading if you run any flavor of Microsoft Windows and need to keep private information private, and especially if your computers support external data connections (read: internet or external access). McNamara covers a wide range of possible computer attacks from the mundane to the geeky-obscure. And he discusses the reasonable likelihood of each different type of attack along with how to identify and defend against them.He also keeps the book common-sense, such as don't invest tens of thousands of dollars in attack-hardened hardware and software if you leave your building unlocked. He talks about physical access restrictions, company security policies, and other considerations regarding the ultimate goal of keeping the contents of your computer system safe - points that some computer security books overlook.Finally, I love that McNamara injects humor, a conversational tone and many case studies into his book. It turns a potentially dry topic into an enjoyable read.

A side of computer security seldom seen

Warning: This book will make you paranoid.It shows you just what kind of problems you face in securing your computers and life in the current legal climate. it shows just what can be done to you legally without papers being served on you. The current laws concerning wiretaping and gathering of evidence. How black bag operations are planned and committed. How your systems can be monitored in many many ways. The book is current as of 2003 and includes information on the oxymoronically named "Patriot Act", as well as CALEA and other laws that remove your privacy from people with guns and an excuse.And then there are the illegal ways.The book does into a level of depth that the current law enforcement community would not want you to know. And you do want to know, even if you don't have anything to hide. (And everyone does have things to protect. Your reputation, your credit information, where you keep your money, not to mention those things that may be unpopular with someone somewhere.)Well worth getting if you have any interest in security, computers or otherwise.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured