Spies Among Us
John Wiley & Sons Inc (Verlag)
978-0-7645-8468-8 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
In Spies Among Us, readers learn: Why James Bond and Sydney Bristow are terrible spies How a team was able to infiltrate an airport in a post-9/11 world and plant a bomb How Ira and his team were able to steal nuclear reactor designs in three hours The real risks that individuals face from the spies that they unknowingly meet on a daily basis Recommendations for how companies and individuals can secure themselves against the spies, criminals, and terrorists who regularly cross their path
Ira Winkler, dubbed a modern-day James Bond, began his career with the super-secret National Security Agency as an undercover security analyst. Since then he has assisted various agencies of the United States and other governments, as well as major corporations, in their battle against the technological underworld. Relentless in his dedication to sealing security breaches, he has "stolen" billions of dollars from huge corporations, lifted nuclear reactor designs in less than four hours, and hacked into multinational networks. In a single day, he siphoned off a billion dollars' worth of information from a leading corporation, exposing a potentially disastrous security gap. Along with espionage simulations and penetration testing, he also investigates cybercrime. Visit his Web site at www.irawinkler.com
Acknowledgments. About the Author. Introduction. PART I: ESPIONAGE CONCEPTS. 1. How to Be a Spy. 2. Why You Can Never Be Secure. 3. Death by 1,000 Cuts. 4. Spies and Their Friends. 5. How the Spies Really Get You. PART II: CASE STUDIES. 6. Spy vs. Spy. 7. Nuclear Meltdown. 8. Fill'er Up! 9. The Entrepreneur. 10. The Criminal Face of the Internet Age. 11. Crimes Against Individuals. PART III: STOPPING THE SPIES. 12. Taking Control. 13. Taking Action.Index.
Erscheint lt. Verlag | 12.4.2005 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 161 x 269 mm |
Gewicht | 708 g |
Einbandart | gebunden |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-7645-8468-5 / 0764584685 |
ISBN-13 | 978-0-7645-8468-8 / 9780764584688 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich