Business espionage: risks, threats, and countermeasures
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully exp...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Butterworth-Heinemann
2015
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Zusammenfassung: | Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author's 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource |
ISBN: | 9780124200548 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044390033 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170630s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780124200548 |9 978-0-12-420054-8 | ||
035 | |a (ZDB-33-ESD)ocn905979862 | ||
035 | |a (OCoLC)905979862 | ||
035 | |a (DE-599)BVBBV044390033 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.4/7 |2 23 | |
100 | 1 | |a Wimmer, Bruce |e Verfasser |4 aut | |
245 | 1 | 0 | |a Business espionage |b risks, threats, and countermeasures |c Bruce Wimmer, CPP. |
264 | 1 | |a Waltham, MA |b Butterworth-Heinemann |c 2015 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author's 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage | ||
650 | 7 | |a Business intelligence |2 fast | |
650 | 7 | |a Confidential business information |2 fast | |
650 | 4 | |a Business intelligence | |
650 | 4 | |a Confidential business information | |
650 | 0 | 7 | |a Wirtschaftsspionage |0 (DE-588)4139137-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Industrie |0 (DE-588)4026779-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Industrie |0 (DE-588)4026779-9 |D s |
689 | 0 | 1 | |a Wirtschaftsspionage |0 (DE-588)4139137-8 |D s |
689 | 0 | 2 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124200548 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029792255 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124200548 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177661858152448 |
---|---|
any_adam_object | |
author | Wimmer, Bruce |
author_facet | Wimmer, Bruce |
author_role | aut |
author_sort | Wimmer, Bruce |
author_variant | b w bw |
building | Verbundindex |
bvnumber | BV044390033 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn905979862 (OCoLC)905979862 (DE-599)BVBBV044390033 |
dewey-full | 658.4/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/7 |
dewey-search | 658.4/7 |
dewey-sort | 3658.4 17 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02488nmm a2200481zc 4500</leader><controlfield tag="001">BV044390033</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170630s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124200548</subfield><subfield code="9">978-0-12-420054-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn905979862</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)905979862</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044390033</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wimmer, Bruce</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business espionage</subfield><subfield code="b">risks, threats, and countermeasures</subfield><subfield code="c">Bruce Wimmer, CPP.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author's 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business intelligence</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Confidential business information</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential business information</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaftsspionage</subfield><subfield code="0">(DE-588)4139137-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Industrie</subfield><subfield code="0">(DE-588)4026779-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Industrie</subfield><subfield code="0">(DE-588)4026779-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Wirtschaftsspionage</subfield><subfield code="0">(DE-588)4139137-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124200548</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029792255</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124200548</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044390033 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:51:38Z |
institution | BVB |
isbn | 9780124200548 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029792255 |
oclc_num | 905979862 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Wimmer, Bruce Verfasser aut Business espionage risks, threats, and countermeasures Bruce Wimmer, CPP. Waltham, MA Butterworth-Heinemann 2015 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author's 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage Business intelligence fast Confidential business information fast Business intelligence Confidential business information Wirtschaftsspionage (DE-588)4139137-8 gnd rswk-swf Industrie (DE-588)4026779-9 gnd rswk-swf Risikomanagement (DE-588)4121590-4 gnd rswk-swf Industrie (DE-588)4026779-9 s Wirtschaftsspionage (DE-588)4139137-8 s Risikomanagement (DE-588)4121590-4 s 1\p DE-604 http://www.sciencedirect.com/science/book/9780124200548 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wimmer, Bruce Business espionage risks, threats, and countermeasures Business intelligence fast Confidential business information fast Business intelligence Confidential business information Wirtschaftsspionage (DE-588)4139137-8 gnd Industrie (DE-588)4026779-9 gnd Risikomanagement (DE-588)4121590-4 gnd |
subject_GND | (DE-588)4139137-8 (DE-588)4026779-9 (DE-588)4121590-4 |
title | Business espionage risks, threats, and countermeasures |
title_auth | Business espionage risks, threats, and countermeasures |
title_exact_search | Business espionage risks, threats, and countermeasures |
title_full | Business espionage risks, threats, and countermeasures Bruce Wimmer, CPP. |
title_fullStr | Business espionage risks, threats, and countermeasures Bruce Wimmer, CPP. |
title_full_unstemmed | Business espionage risks, threats, and countermeasures Bruce Wimmer, CPP. |
title_short | Business espionage |
title_sort | business espionage risks threats and countermeasures |
title_sub | risks, threats, and countermeasures |
topic | Business intelligence fast Confidential business information fast Business intelligence Confidential business information Wirtschaftsspionage (DE-588)4139137-8 gnd Industrie (DE-588)4026779-9 gnd Risikomanagement (DE-588)4121590-4 gnd |
topic_facet | Business intelligence Confidential business information Wirtschaftsspionage Industrie Risikomanagement |
url | http://www.sciencedirect.com/science/book/9780124200548 |
work_keys_str_mv | AT wimmerbruce businessespionagerisksthreatsandcountermeasures |