Description |
1 online resource (152 pages) |
Contents |
Cover -- Title -- Copyright -- Contents -- Foreword -- 1 Espionage: an underestimated matter -- Yesterdayâ#x80;#x99;s paranoia is tomorrowâ#x80;#x99;s threat -- Digital transformation and espionage -- Security risks included -- Technical progress -- Loss is everywhere -- Why we hear so little about industrial espionage -- 2 From competition to economic warfare -- Business means war -- The great confusion of terms and definitions -- OSINT: open source intelligence -- HUMINT: human intelligence -- SIGINT: signals intelligence -- COMINT, ELINT and TECHINT |
|
At the limits of law and ethicsCompetitive intelligence -- Espionage at the expense of companies -- Espionage as a business model -- Anyone can be affected -- 3 From old-school espionage to modern methods of attack -- The dawn of economic espionage -- The magic of silk -- The power of fire -- The broken mirror -- On the way to paper -- Russian economic development -- How porcelain came to Europe -- The secret of tea -- The beginning of the English textile industry -- The end of the rubber monopoly -- The German steam engine |
|
As hard as Krupp steel â#x80;#x93; thanks to some help from the EnglishEspionage as an international business -- The dreaded copier -- Supersonic spies -- The fight for sovereignty in the air -- When the secret service lends a hand -- Hopefully itâ#x80;#x99;s concrete -- Gone with the wind -- Sow the wind and reap the whirlwind -- Bad employees -- A French economic development programme -- Betrayal by former employees -- The Detroit and Wolfsburg Strangler -- Bugs for everyone -- Starwood versus Hilton -- Programme code gone astray -- Sharp razors |
|
Garbage bin archaeologyBetween garbage bins and false identities -- Unfair play -- Secret formula -- The Tour de France Trojan -- Long live sport -- Varied interests -- Perfectionist product counterfeiters -- The short route to a new design -- The senior executive and the baby monitor -- Unsafe at any speed -- The notebook in the hotel room -- A new age of industrial espionage -- 4 Economic and industrial espionage in the digital age -- Helpless victims -- The author and the Trojan Horse -- The price of support -- The trainee with the USB stick |
|
The classic hackFor whom the sun shines -- Medium-sized companies in the sights of hackers -- The hacker and the network -- Plundered into insolvency -- Spied on and repelled -- Designed and collected -- Operation Aurora -- New hazard potentials -- Dangerous places and devices -- The return of the dreaded copier -- The curse of the good deed -- Espionage via the power plug -- The Internet café risk factor -- Public Wi-Fi -- Drones and espionage -- Mind the camera -- Smartphones as pocket bugs -- Google Glass -- Built-in risks -- Open back doors |
Notes |
""The attack of the hand scanner"" |
|
Print version record |
Form |
Electronic book
|
ISBN |
9781317005056 |
|
1317005058 |
|