Hot Best Seller

Secrets of Computer Espionage: Tactics and Countermeasures

Availability: Ready to download

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government * Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers * Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government * Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals * Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes * Companion Web site contains links to security tools and useful security information resources


Compare

* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government * Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers * Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government * Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals * Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes * Companion Web site contains links to security tools and useful security information resources

38 review for Secrets of Computer Espionage: Tactics and Countermeasures

  1. 5 out of 5

    Raj

    This book was a pretty comprehensive introduction to electronic espionage, covering everything from what to do when you have physical access to a machine to network attacks, searching for evidence on a compromised machine and more. It took it from both the point of view of the attacker and defender, first talking about methods of attack and then countermeasures. Although it didn't necessarily go into great detail, there were a lot of links to the web and references to tools a spy could use. A go This book was a pretty comprehensive introduction to electronic espionage, covering everything from what to do when you have physical access to a machine to network attacks, searching for evidence on a compromised machine and more. It took it from both the point of view of the attacker and defender, first talking about methods of attack and then countermeasures. Although it didn't necessarily go into great detail, there were a lot of links to the web and references to tools a spy could use. A good overview of the subject.

  2. 5 out of 5

    milton

    i could comment, but then i'd have to kill you. i could comment, but then i'd have to kill you.

  3. 4 out of 5

    Rebecca Orton

    I learned that a file can be secretly attached to another file and we would not see the attachment in the directory or anywhere else. I learned about hardware keyloggers and what they looked like. I also learned general concepts of computer spying. The book was already out of date and appeared to be written in 2002 or 2003. It was nice to be able to catch up to at least that time. The book repeatedly recommended using encryption and strong passwords that are at least 8 characters long and cannot I learned that a file can be secretly attached to another file and we would not see the attachment in the directory or anywhere else. I learned about hardware keyloggers and what they looked like. I also learned general concepts of computer spying. The book was already out of date and appeared to be written in 2002 or 2003. It was nice to be able to catch up to at least that time. The book repeatedly recommended using encryption and strong passwords that are at least 8 characters long and cannot be found in a dictionary. There were many acronyms that were explained in the book like PGP - Pretty Good Privacy. The stories peppered throughout the book were fascinating. The book even talked about sophisticated counterintelligence equipment that rang a bell with me, since my ex-fiance was a counterintelligence technician when he was in the Army. However, the author wasn't even sure it existed. I thought that was unusual because the author usually wrote very matter-of-factly about the rest of the computer equipment and accessories covered in the book. I would have liked to reassure the author. The book covered PDA's and how popular they were in the markets and even called smart-phones PDA-enabled phones. That was interesting. Overall, if this book could be updated in a new edition, I would highly recommend it.

  4. 4 out of 5

    Captain Jack

    This book was amazing, but just the slightest bit obselete. It has how-to information, both attack and defense, and suggestions for buying products. The coolest section was about black bag jobs, where a group of agents break into a building. The book also has scenarios, to help you learn about real-life hacking situations. I read this book every night!

  5. 5 out of 5

    Louis

    NSA am I on your "good" or "bad" list? Realistically, I am probably on their "watch" list. NSA am I on your "good" or "bad" list? Realistically, I am probably on their "watch" list.

  6. 5 out of 5

    David Benge

  7. 5 out of 5

    Howard

  8. 4 out of 5

    Michael Bond

  9. 4 out of 5

    Mohammad Mahajna

    pmokmpo

  10. 5 out of 5

    Henry Denneen

  11. 4 out of 5

    Mei

  12. 4 out of 5

    Nick Zaccardi

  13. 4 out of 5

    Jahn

  14. 4 out of 5

    Darian Sparks

  15. 5 out of 5

    Case Muller

  16. 4 out of 5

    jtdoidge

  17. 4 out of 5

    Verdandi

  18. 4 out of 5

    Matt

  19. 5 out of 5

    Chee-khiang

  20. 4 out of 5

    James Beldock

  21. 5 out of 5

    Brad

  22. 4 out of 5

    AER

  23. 5 out of 5

    Sylvin

  24. 4 out of 5

    Wattschosenseed

  25. 4 out of 5

    Sylvin

  26. 4 out of 5

    Mark Cichonski

  27. 4 out of 5

    Philip

  28. 4 out of 5

    Mike

  29. 4 out of 5

    James

  30. 4 out of 5

    William Hua

  31. 5 out of 5

    John

  32. 4 out of 5

    Karl

  33. 4 out of 5

    Pinar

  34. 5 out of 5

    Tg7angel

  35. 5 out of 5

    David Yeo

  36. 5 out of 5

    Glenn

  37. 5 out of 5

    Marcie

  38. 4 out of 5

    K

Add a review

Your email address will not be published. Required fields are marked *

Loading...