Corporate espionage: what it is, why it is happening in your company, what you must do about it
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Rocklin, Calif.
Prima Publ.
1997
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015152078&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XVIII, 365 S. |
ISBN: | 0761508406 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021936925 | ||
003 | DE-604 | ||
005 | 20040302000000.0 | ||
007 | t| | ||
008 | 971009s1997 xx |||| 00||| eng d | ||
020 | |a 0761508406 |9 0-7615-0840-6 | ||
035 | |a (OCoLC)36379798 | ||
035 | |a (DE-599)BVBBV021936925 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-83 | ||
050 | 0 | |a HD38.7 | |
082 | 0 | |a 658.4/7 |2 21 | |
100 | 1 | |a Winkler, Ira |e Verfasser |4 aut | |
245 | 1 | 0 | |a Corporate espionage |b what it is, why it is happening in your company, what you must do about it |
264 | 1 | |a Rocklin, Calif. |b Prima Publ. |c 1997 | |
300 | |a XVIII, 365 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Business intelligence |z United States | |
650 | 4 | |a Espionage |z United States | |
650 | 0 | 7 | |a NEMP |0 (DE-588)4115359-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a NEMP |0 (DE-588)4115359-5 |D s |
689 | 3 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015152078&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-015152078 |
Datensatz im Suchindex
_version_ | 1819374349178634240 |
---|---|
adam_text | Contents
Acknowledgments ix
Introduction: Or Why Kevin Mitnick Represents Everything
That Is Wrong with the Information Age xi
Part I Espionage Concepts
1 Information Is Information 3
2 Risk: The Core of Espionage 12
3 Value 28
4 Threat 37
5 Vulnerability 89
Part II Case Studies
6 Crippling a Company by Telephone 139
7 Anatomy of an Industrial Espionage Attack
OrHowtoStealSl Billion in aDay and a Half 152
8 Chips and Dips 184
V i i i Contents
9 Russian Roulette 212
10 The Liaison 229
11 Smile, You re on Candid Camera 241
12 The Weakest Link 253
13 The Things You Never Hear About 260
Part III What You Can Do
14 Countermeasures 273
15 Taking Action 340
Index 349
|
any_adam_object | 1 |
author | Winkler, Ira |
author_facet | Winkler, Ira |
author_role | aut |
author_sort | Winkler, Ira |
author_variant | i w iw |
building | Verbundindex |
bvnumber | BV021936925 |
callnumber-first | H - Social Science |
callnumber-label | HD38 |
callnumber-raw | HD38.7 |
callnumber-search | HD38.7 |
callnumber-sort | HD 238.7 |
callnumber-subject | HD - Industries, Land Use, Labor |
ctrlnum | (OCoLC)36379798 (DE-599)BVBBV021936925 |
dewey-full | 658.4/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/7 |
dewey-search | 658.4/7 |
dewey-sort | 3658.4 17 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01709nam a2200469zc 4500</leader><controlfield tag="001">BV021936925</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040302000000.0</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">971009s1997 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0761508406</subfield><subfield code="9">0-7615-0840-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)36379798</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021936925</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD38.7</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/7</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winkler, Ira</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Corporate espionage</subfield><subfield code="b">what it is, why it is happening in your company, what you must do about it</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rocklin, Calif.</subfield><subfield code="b">Prima Publ.</subfield><subfield code="c">1997</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 365 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Espionage</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">NEMP</subfield><subfield code="0">(DE-588)4115359-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">NEMP</subfield><subfield code="0">(DE-588)4115359-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015152078&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015152078</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV021936925 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T12:45:16Z |
institution | BVB |
isbn | 0761508406 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015152078 |
oclc_num | 36379798 |
open_access_boolean | |
owner | DE-706 DE-83 |
owner_facet | DE-706 DE-83 |
physical | XVIII, 365 S. |
publishDate | 1997 |
publishDateSearch | 1997 |
publishDateSort | 1997 |
publisher | Prima Publ. |
record_format | marc |
spellingShingle | Winkler, Ira Corporate espionage what it is, why it is happening in your company, what you must do about it Business intelligence United States Espionage United States NEMP (DE-588)4115359-5 gnd Computerkriminalität (DE-588)4010452-7 gnd Informationssystem (DE-588)4072806-7 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4115359-5 (DE-588)4010452-7 (DE-588)4072806-7 (DE-588)4011134-9 |
title | Corporate espionage what it is, why it is happening in your company, what you must do about it |
title_auth | Corporate espionage what it is, why it is happening in your company, what you must do about it |
title_exact_search | Corporate espionage what it is, why it is happening in your company, what you must do about it |
title_full | Corporate espionage what it is, why it is happening in your company, what you must do about it |
title_fullStr | Corporate espionage what it is, why it is happening in your company, what you must do about it |
title_full_unstemmed | Corporate espionage what it is, why it is happening in your company, what you must do about it |
title_short | Corporate espionage |
title_sort | corporate espionage what it is why it is happening in your company what you must do about it |
title_sub | what it is, why it is happening in your company, what you must do about it |
topic | Business intelligence United States Espionage United States NEMP (DE-588)4115359-5 gnd Computerkriminalität (DE-588)4010452-7 gnd Informationssystem (DE-588)4072806-7 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Business intelligence United States Espionage United States NEMP Computerkriminalität Informationssystem Datenschutz USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015152078&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT winklerira corporateespionagewhatitiswhyitishappeninginyourcompanywhatyoumustdoaboutit |