Secrets of Computer Espionage: Tactics and Countermeasures 1st Edition

4.7 out of 5 stars 20 ratings
ISBN-13: 978-0764537103
ISBN-10: 9780764537103
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Amazon book clubs early access

Join or create book clubs

Choose books together

Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Used: Very Good | Details
Condition: Used: Very Good
Comment: Cover edges show some minor wear from reading and storage.Pages are clean; there is no writing, highlighting or margin notes.
Access codes and supplements are not guaranteed with used items.
FREE delivery: Sep 27 - 30
Only 2 left in stock - order soon.
Ships from and sold by PAMS Ent.
FREE delivery: Sep 24 - Oct 1
1-Click ordering is not available for this item.

Amazon First Reads | Editors' picks at exclusive prices

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore
    Android

To get the free app, enter your mobile phone number.

kcpAppSendButton

Editorial Reviews

Review

&an informative book which should help keep those defences up and those intruders out& -- PC Utilities, No.39, 2003

&informative&entertaining&next time you go to your local bookseller, locate a copy. I bet you'll be hooked& -- Linux Journal, 22 August 2003

“…provides insightful details backed up by a wealth of real-life examples….clearly a valuable addition to your bookshelf…” (www.net-security.org, May 2004)

“…surprisingly clear given the degree of difficulty of his topic,…we suggest this practical book top managers…” (www.getabstract.com, May 2004)

"…an informative book which should help keep those defences up and those intruders out…" (PC Utilities, No.39, 2003)

“…will definitely open your eyes…quirky case studies and good coverage of latest technology…” (Internetworks, November 2003)

“…informative…entertaining…next time you go to your local bookseller, locate a copy. I bet you’ll be hooked…” (Linux Journal, 22 August 2003)

&an informative book which should help keep those defences up and those intruders out& -- PC Utilities, No.39, 2003

&informative&entertaining&next time you go to your local bookseller, locate a copy. I bet you'll be hooked& -- Linux Journal, 22 August 2003

&will definitely open your eyes&quirky case studies and good coverage of latest technology& -- Internetworks, November 2003

From the Back Cover

Is someone spying on you?

You might be surprised

It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent–or the whiz kid down the street. More and more people today want to know what’s on your computer, your PDA, your cell phone, or your wireless network. And as soon as one vulnerable chink in your security is identified and plugged, a new spy tool or method will arise to circumvent the countermeasure.

Joel McNamara takes you inside the mind of the computer espionage artist–amateur or professional–and shows you appropriate defenses for a wide array of potential vulnerabilities.

This is not just another book on network security. This is the book that teaches you to think like a spy, because that’s the only way to outwit one.

  • Analyze your risk of becoming a target of espionage
  • Recognize and lock down the vulnerabilities of instant messaging, Web browsers, e-mail inboxes, and address books
  • Understand where electronic eavesdropping becomes criminal–and where it’s perfectly legal
  • Discover how spies circumvent security measures and learn how to protect yourself
  • Find out how law enforcement recovers evidence from a suspect computer
  • See how a determined spy can compromise the average fax machine, paper shredder, cell phone, voice-mail, pager, PDA, and digital camera
  • Learn how the government uses computer espionage techniques to combat drug lords, organized crime, foreign terrorists, and industrial espionage
  • Explore some of the top-secret national spying projects like TEMPEST, ECHELON, Carnivore/DCS-1000, intelligence-gathering worms and viruses, and what impact they may have on you


Treat yourself, you've earned it

Product details

  • ASIN ‏ : ‎ 0764537105
  • Publisher ‏ : ‎ John Wiley &Sons; 1st edition (June 13, 2003)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 386 pages
  • ISBN-10 ‏ : ‎ 9780764537103
  • ISBN-13 ‏ : ‎ 978-0764537103
  • Item Weight ‏ : ‎ 1.2 pounds
  • Dimensions ‏ : ‎ 7.5 x 0.87 x 9.25 inches
  • Customer Reviews:
    4.7 out of 5 stars 20 ratings

Customer reviews

4.7 out of 5 stars
4.7 out of 5
20 global ratings
5 star
68%
4 star
32%
3 star 0% (0%) 0%
2 star 0% (0%) 0%
1 star 0% (0%) 0%
How are ratings calculated?

Top reviews from the United States

Reviewed in the United States on June 26, 2003
Verified Purchase
18 people found this helpful
Report abuse
Reviewed in the United States on September 16, 2012
Verified Purchase
Reviewed in the United States on October 30, 2009
Verified Purchase
One person found this helpful
Report abuse
Reviewed in the United States on January 5, 2013
Verified Purchase
Reviewed in the United States on June 1, 2015
Verified Purchase
Reviewed in the United States on June 1, 2005
4 people found this helpful
Report abuse