Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Secrets of Computer Espionage
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Secrets of Computer Espionage

Secrets of Computer Espionage

Tactics and Countermeasures

Joel McNamara

362 pages, parution le 26/06/2003

Résumé

It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent–or the whiz kid down the street. More and more people today want to know what's on your computer, your PDA, your cell phone, or your wireless network. And as soon as one vulnerable chink in your security is identified and plugged, a new spy tool or method will arise to circumvent the countermeasure.

Joel McNamara takes you inside the mind of the computer espionage artist–amateur or professional–and shows you appropriate defenses for a wide array of potential vulnerabilities.

This is not just another book on network security. This is the book that teaches you to think like a spy, because that's the only way to outwit one.

  • Analyze your risk of becoming a target of espionage
  • Recognize and lock down the vulnerabilities of instant messaging, Web browsers, e-mail inboxes, and address books
  • Understand where electronic eavesdropping becomes criminal–and where it's perfectly legal
  • Discover how spies circumvent security measures and learn how to protect yourself
  • Find out how law enforcement recovers evidence from a suspect computer
  • See how a determined spy can compromise the average fax machine, paper shredder, cell phone, voice-mail, pager, PDA, and digital camera
  • Learn how the government uses computer espionage techniques to combat drug lords, organized crime, foreign terrorists, and industrial espionage
  • Explore some of the top-secret national spying projects like TEMPEST, ECHELON, Carnivore/DCS-1000, intelligence-gathering worms and viruses, and what impact they may have on you

Contents

  • Spies.
  • Spying and the Law.
  • Black Bag Jobs.
  • Breaching the System.
  • Searching for Evidence.
  • Unprotecting Data.
  • Copying Data.
  • Snooping with Keyloggers.
  • Spying with Trojan Horses.
  • Network Eavesdropping.
  • 802.11b Wireless Network Eavesdropping.
  • Spying on Electronic Devices.
  • Advanced Computer Espionage.
  • Appendix A: What's on the Web Site.

L'auteur - Joel McNamara

is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) Joel McNamara
Parution 26/06/2003
Nb. de pages 362
Format 18,5 x 23
Couverture Broché
Poids 570g
Intérieur Noir et Blanc
EAN13 9780764537103
ISBN13 978-0-7645-3710-3

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription