
Secrets of Computer Espionage
Tactics and Countermeasures
Résumé
It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent–or the whiz kid down the street. More and more people today want to know what's on your computer, your PDA, your cell phone, or your wireless network. And as soon as one vulnerable chink in your security is identified and plugged, a new spy tool or method will arise to circumvent the countermeasure.
Joel McNamara takes you inside the mind of the computer espionage artist–amateur or professional–and shows you appropriate defenses for a wide array of potential vulnerabilities.
This is not just another book on network security. This is the book that teaches you to think like a spy, because that's the only way to outwit one.
- Analyze your risk of becoming a target of espionage
- Recognize and lock down the vulnerabilities of instant messaging, Web browsers, e-mail inboxes, and address books
- Understand where electronic eavesdropping becomes criminal–and where it's perfectly legal
- Discover how spies circumvent security measures and learn how to protect yourself
- Find out how law enforcement recovers evidence from a suspect computer
- See how a determined spy can compromise the average fax machine, paper shredder, cell phone, voice-mail, pager, PDA, and digital camera
- Learn how the government uses computer espionage techniques to combat drug lords, organized crime, foreign terrorists, and industrial espionage
- Explore some of the top-secret national spying projects like TEMPEST, ECHELON, Carnivore/DCS-1000, intelligence-gathering worms and viruses, and what impact they may have on you
Contents
- Spies.
- Spying and the Law.
- Black Bag Jobs.
- Breaching the System.
- Searching for Evidence.
- Unprotecting Data.
- Copying Data.
- Snooping with Keyloggers.
- Spying with Trojan Horses.
- Network Eavesdropping.
- 802.11b Wireless Network Eavesdropping.
- Spying on Electronic Devices.
- Advanced Computer Espionage.
- Appendix A: What's on the Web Site.
L'auteur - Joel McNamara
is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Joel McNamara |
Parution | 26/06/2003 |
Nb. de pages | 362 |
Format | 18,5 x 23 |
Couverture | Broché |
Poids | 570g |
Intérieur | Noir et Blanc |
EAN13 | 9780764537103 |
ISBN13 | 978-0-7645-3710-3 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet