x

Our Privacy Policy has changed. By using this site, you agree to the Privacy Policy.

Secrets of Computer Espionage Tactics and Countermeasures

ISBN-10: 0764537105
ISBN-13: 9780764537103
Edition: 2003
Authors: Joel McNamara
List price: $40.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Everyone is watching. With hacking, security violations, identity theft and corporate espionage incidents compounding, this title provides readers with computer espionage tactics and countermeasures.

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $40.00
Copyright year: 2003
Publisher: John Wiley & Sons, Incorporated
Publication date: 6/20/2003
Binding: Paperback
Pages: 384
Size: 7.25" wide x 10.00" long x 0.50" tall
Weight: 1.210
Language: English

Everyone is watching. With hacking, security violations, identity theft and corporate espionage incidents compounding, this title provides readers with computer espionage tactics and countermeasures.

Joel McNamara is a technology consultant, author, adventure racer, and veteran geocacher. He's experienced in search-and-rescue and disaster response operations.

Acknowledgments
Introduction
Spies
Getting to Know Spies
What Spies Are After and Who They Are
Business Spies--Economic Espionage
Bosses--Employee Monitoring
Cops--Law Enforcement Investigations
Private Eyes and Consultants--Private Investigations
Spooks--Government-Sponsored Intelligence Gathering
Criminals--Ill-Gotten Gains
Whistleblowers--For the Public Good
Friends and Family--with Friends like These
Determining Your Level of Paranoia
Risk Analysis 101
Five-Step Risk Analysis
Summary
Spying and the Law
Laws that Relate to Spying
Omnibus Crime Control and Safe Streets Act of 1968 (Title III--Wiretap Act)
Foreign Intelligence Surveillance Act of 1978
Electronic Communications Privacy Act of 1986
Computer Fraud and Abuse Act of 1986
Economic Espionage Act of 1996
State Laws
Implications of the USA Patriot Act of 2001
Wiretap and Stored Communications Access Acts
Foreign Intelligence Surveillance Act
Computer Fraud and Abuse Act
Other Provisions
State Laws
The Realities of Enforcement
Civil versus Criminal Court
Bosses and Employees--Legal Spying
Legal Issues with Family Members
Summary
Black Bag Jobs
A Look Inside the Black Bag
Physical and Network Black Bag Jobs
Planned and Opportunistic Black Bag Jobs
Spy Tactics
Spy Games
Inside a Government Black Bag Job
Exploiting the Vulnerabilities
Researching and Planning the Operation
Gaining Entry
Documenting the Scene
Countermeasures
Physical Security
Security Policies
Summary
Breaching the System
Spy Tactics
Exploiting the Vulnerabilities
System-Breaching Tools
Countermeasures
Security Settings
Effective Passwords
Encryption
Summary
Searching for Evidence
Legal Spying
How Computer Cops Work
Seizure
Forensic Duplication
Examination
Spy Tactics
Exploiting the Vulnerabilities
Evidence-Gathering Tools
Countermeasures
Encryption
Steganography
File Wipers
Evidence-Eliminating Software
Summary
Unprotecting Data
Spy Tactics
Exploiting Vulnerabilities
Cracking Tools
Countermeasures
Strong Encryption
Password Policies
Password Lists
Password Alternatives
Summary
Copying Data
Spy Tactics
Use Available Resources
Use Compression Tools
Consider Other Data
Understand What's Involved in Copying Data
Storage Media to Target
Floppy Disks
CD-R/CD-RWs
DVDs
ZIP Disks
Memory Storage Devices
Hard Drives
Tape Backup Systems
Alternate Methods of Copying Data
Transferring Data Over a Network
Digital Cameras
Summary
Snooping with Keyloggers
An Introduction to Keyloggers
Spy Tactics
Exploiting the Vulnerabilities
Keylogger Tools
Countermeasures
Viewing Installed Programs
Examining Startup Programs
Examining Running Processes
Monitoring File Writes
Removing Visual Basic Runtimes
Searching for Strings
Using Personal Firewalls
Using File Integrity and Registry Checkers
Using Keylogger-Detection Software
Using Sniffers
Detecting Hardware Keyloggers
Exploiting Keylogger Passwords
Using Linux
Watching for Unusual Crashes
Removing Keyloggers
Summary
Spying with Trojan Horses
Spy Tactics
Exploiting the Vulnerabilities
Trojan Horse Tools
Countermeasures
Network Defenses
Using Registry Monitors and File-Integrity Checkers
Using Antivirus Software
Using Trojan Detection Software
Removing Trojan Horses
Using Non-Microsoft Software
Summary
Network Eavesdropping
Introduction to Network Spying
Types of Network Attacks
Network Attack Origin Points
Information Compromised During Network Attacks
Broadband Risks
Spy Tactics
Exploiting the Vulnerabilities
Network-Information and -Eavesdropping Tools
Countermeasures
Applying Operating System and Application Updates
Using Intrusion Detection Systems
Using Firewalls
Running a Virtual Private Network
Monitoring Network Connections
Using Sniffers
Using Port and Vulnerability Scanners
Encrypting Your E-Mail
Encrypting Your Instant Messages
Using Secure Protocols
Don't Trust "Strange" Computers and Networks
Hardening Windows File Sharing
Using Secure Web E-Mail
Using Anonymous Remailers
Using Web Proxies
Summary
802.11b Wireless Network Eavesdropping
An Introduction to Wireless Networks
History of the Wireless Network
Spy Tactics
Exploiting the Vulnerabilities
Wireless-Network-Eavesdropping Tools
Countermeasures
Audit Your Own Network
Position Antennas Correctly
Detect Wireless Discovery Tools
Fool Discovery Tools
Enable WEP
Change WEP Keys Regularly
Authenticate MAC Addresses
Rename the SSID
Disable Broadcast SSID
Change the Default AP Password
Use Static IP Addresses versus DHCP
Locate APs Outside Firewalls
Use VPNs
Don't Rely on Distance as Security
Turn Off the AP
Summary
Spying on Electronic Devices
Office Devices
Fax Machines
Shredders
Communication Devices
Telephones
Cellular Phones
Answering Machines and Voice-Mail
Pagers
Consumer Electronics
PDAs
Digital Cameras
GPS Units
Video Game Consoles
MP3 Players
Television Digital Recorders
Summary
Advanced Computer Espionage
TEMPEST--Electromagnetic Eavesdropping
Emanation Monitoring: Fact or Fiction?
EMSEC Countermeasures
Optical TEMPEST--LEDs and Reflected Light
HIJACK and NONSTOP
ECHELON--Global Surveillance
How ECHELON Works
ECHELON Controversy and Countermeasures
Carnivore/DCS-1000
An Overview of Carnivore
Carnivore Controversy and Countermeasures
Magic Lantern
Modified Applications and Operating System Components
Intelligence-Gathering Viruses and Worms
Viruses and Worms
Countermeasures
Surveillance Cameras
Webcams
Commercial Surveillance Cameras
Summary
What's on the Web Site
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×