Secrets of Computer Espionage: Tactics and Countermeasures and over 2 million other books are available for Amazon Kindle . Learn more


or
Sign in to turn on 1-Click ordering.
Trade in Yours
For a £0.90 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Start reading Secrets of Computer Espionage: Tactics and Countermeasures on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Secrets of Computer Espionage: Tactics and Countermeasures (Computing) [Paperback]

Joel McNamara
5.0 out of 5 stars  See all reviews (1 customer review)
RRP: £24.50
Price: £21.39 & FREE Delivery in the UK. Details
You Save: £3.11 (13%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 26 Oct.? Choose Express delivery at checkout. Details

Formats

Amazon Price New from Used from
Kindle Edition £20.32  
Paperback £21.39  
Trade In this Item for up to £0.90
Trade in Secrets of Computer Espionage: Tactics and Countermeasures (Computing) for an Amazon Gift Card of up to £0.90, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

13 Jun 2003 Computing
∗ Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government ∗ Author shares easily–implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals ∗ Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes ∗ Companion Web site contains links to security tools and useful security information resources

Special Offers and Product Promotions

  • Between 20-26 October 2014, spend £10 in a single order on item(s) dispatched from and sold by Amazon.co.uk and receive a £2 promotional code to spend in the Amazon Appstore. Here's how (terms and conditions apply)

Product details

  • Paperback: 384 pages
  • Publisher: John Wiley & Sons; 1 edition (13 Jun 2003)
  • Language: English
  • ISBN-10: 0764537105
  • ISBN-13: 978-0764537103
  • Product Dimensions: 23 x 19 x 3 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 971,427 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Discover books, learn about writers, and more.

Product Description

Review

“…provides insightful details backed up by a wealth of real–life examples….clearly a valuable addition to your bookshelf…” ( www.net–security.org , May 2004) “…surprisingly clear given the degree of difficulty of his topic,…we suggest this practical book top managers…” ( www.getabstract.com , May 2004) "…an informative book which should help keep those defences up and those intruders out…" ( PC Utilities , No.39, 2003) “…will definitely open your eyes…quirky case studies and good coverage of latest technology…” ( Internetworks , November 2003) “…informative…entertaining…next time you go to your local bookseller, locate a copy. I bet you’ll be hooked…” ( Linux Journal , 22 August 2003)

“…provides insightful details backed up by a wealth of real–life examples….clearly a valuable addition to your bookshelf…” ( www.net–security.org , May 2004) “…surprisingly clear given the degree of difficulty of his topic,…we suggest this practical book top managers…” ( www.getabstract.com , May 2004) “…an informative book which should help keep those defences up and those intruders out…” ( PC Utilities , No.39, 2003) “…will definitely open your eyes…quirky case studies and good coverage of latest technology…” ( Internetworks , November 2003) “…informative…entertaining…next time you go to your local bookseller, locate a copy. I bet you’ll be hooked…” ( Linux Journal , 22 August 2003)

From the Back Cover

Is someone spying on you? You might be surprised It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent–or the whiz kid down the street. More and more people today want to know what’s on your computer, your PDA, your cell phone, or your wireless network. And as soon as one vulnerable chink in your security is identified and plugged, a new spy tool or method will arise to circumvent the countermeasure. Joel McNamara takes you inside the mind of the computer espionage artist–amateur or professional–and shows you appropriate defenses for a wide array of potential vulnerabilities. This is not just another book on network security. This is the book that teaches you to think like a spy, because that’s the only way to outwit one. Analyze your risk of becoming a target of espionage Recognize and lock down the vulnerabilities of instant messaging, Web browsers, e–mail inboxes, and address books Understand where electronic eavesdropping becomes criminal–and where it’s perfectly legal Discover how spies circumvent security measures and learn how to protect yourself Find out how law enforcement recovers evidence from a suspect computer See how a determined spy can compromise the average fax machine, paper shredder, cell phone, voice–mail, pager, PDA, and digital camera Learn how the government uses computer espionage techniques to combat drug lords, organized crime, foreign terrorists, and industrial espionage Explore some of the top–secret national spying projects like TEMPEST, ECHELON, Carnivore/DCS–1000, intelligence–gathering worms and viruses, and what impact they may have on you

Inside This Book (Learn More)
First Sentence
What Ronald Reagan (the "Great Communicator") didn't mention is that sometimes information is also highly sought after, and people will go to great lengths to get it. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4 star
0
3 star
0
2 star
0
1 star
0
5.0 out of 5 stars
5.0 out of 5 stars
Most Helpful Customer Reviews
2 of 3 people found the following review helpful
5.0 out of 5 stars Highly Recommended! 21 April 2004
By Rolf Dobelli TOP 500 REVIEWER
Format:Paperback
You and your computer face a dizzying array of security threats, writestech consultant Joel McNamara. Competitors, cops, crooks and evendisgruntled kin would love a peek at your hard drive. But don'thyperventilate just yet. If you calmly analyze the desirability andvulnerability of your secrets, you can figure out how to protect yourself.McNamara's prose is surprisingly clear given the degree of difficulty ofhis topic, and he offers a number of useful sidebars, charts and examplesfrom inside the tech business to juice up his instructional tome. Wesuggest this practical book to managers charged with protecting corporatedata, and to people who are unsure just how safe their computers are.
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.7 out of 5 stars  15 reviews
18 of 18 people found the following review helpful
5.0 out of 5 stars Informative and practical, plus a fun read 18 Aug 2003
By Dean Smith - Published on Amazon.com
Format:Paperback
As co-owner of a small business I read "Secrets of Computer Espionage" with interest, particularly since I thought that running a firewall and virus protection made my system fairly safe from intrusion. Hardly.
Consider the book required reading if you run any flavor of Microsoft Windows and need to keep private information private, and especially if your computers support external data connections (read: internet or external access).
McNamara covers a wide range of possible computer attacks from the mundane to the geeky-obscure. And he discusses the reasonable likelihood of each different type of attack along with how to identify and defend against them.
He also keeps the book common-sense, such as don't invest tens of thousands of dollars in attack-hardened hardware and software if you leave your building unlocked. He talks about physical access restrictions, company security policies, and other considerations regarding the ultimate goal of keeping the contents of your computer system safe - points that some computer security books overlook.
Finally, I love that McNamara injects humor, a conversational tone and many case studies into his book. It turns a potentially dry topic into an enjoyable read.
18 of 19 people found the following review helpful
5.0 out of 5 stars A side of computer security seldom seen 26 Jun 2003
By Alan Olsen - Published on Amazon.com
Format:Paperback|Verified Purchase
Warning: This book will make you paranoid.
It shows you just what kind of problems you face in securing your computers and life in the current legal climate. it shows just what can be done to you legally without papers being served on you. The current laws concerning wiretaping and gathering of evidence. How black bag operations are planned and committed. How your systems can be monitored in many many ways.
The book is current as of 2003 and includes information on the oxymoronically named "Patriot Act", as well as CALEA and other laws that remove your privacy from people with guns and an excuse.
And then there are the illegal ways.
The book does into a level of depth that the current law enforcement community would not want you to know. And you do want to know, even if you don't have anything to hide. (And everyone does have things to protect. Your reputation, your credit information, where you keep your money, not to mention those things that may be unpopular with someone somewhere.)
Well worth getting if you have any interest in security, computers or otherwise.
7 of 7 people found the following review helpful
5.0 out of 5 stars Highly Recommended! 21 April 2004
By Rolf Dobelli - Published on Amazon.com
Format:Paperback
You and your computer face a dizzying array of security threats, writes tech consultant Joel McNamara. Competitors, cops, crooks and even disgruntled kin would love a peek at your hard drive. But don't hyperventilate just yet. If you calmly analyze the desirability and vulnerability of your secrets, you can figure out how to protect yourself. McNamara's prose is surprisingly clear given the degree of difficulty of his topic, and he offers a number of useful sidebars, charts and examples from inside the tech business to juice up his instructional tome. We suggest this practical book to managers charged with protecting corporate data, and to people who are unsure just how safe their computers are.
6 of 7 people found the following review helpful
5.0 out of 5 stars Wow! Absolutely a great, great book! 25 Nov 2003
By Mike Galos - Published on Amazon.com
Format:Paperback
Joel McNamara's book is one of the very, very, few books that I classify as a "Must Read" for anyone involved in business or technology. This book does an amazing job of avoiding the "paranoia for paranoia's sake" tone seen so often in computer security books while still taking the issues seriously and discussing them intellegently.
The conversational tone is fun and often quite funny while not making the user feel talked down to. And Mr. McNamara does an equally great job of explaining very complex topics in way that works for both extremely sophisticated computer technology professionals and non-techies alike. I've brought this book around for side-discussions in the seminars I've given since it came out and my students, ranging from small business owners to 30+ year professional tech veterans in Fortune 50s have learned new and important lessons from it. For a book to address all these audiences is rare. For a book to succeed and be invaluable for all of them is virtually unheard of. This book succeeds amazingly well.
I've not only read the book through in one sitting, I keep referring back to it and it's incredibly useful web site on a regular basis.
Joel, thank you for writing one of the key books of the year!
3 of 3 people found the following review helpful
4.0 out of 5 stars Informative look at the risks of digital espionage 1 Jun 2005
By Ben Rothke - Published on Amazon.com
Format:Paperback
Judging from the title, Secrets of Computer Espionage: Tactics and Countermeasures would appear to be geared to governments, security agencies, or high-level corporations. In fact, as the author makes clear, anyone with an Internet connection is a potential target of online espionage-even by such "mundane" means as viruses, worms, and phishing attacks-and this book is addressed to that huge audience.

Just who is spying on whom? The author explains that the typical person might be a target of bosses, friends, family members, hackers, and many others. Even people with nothing confidential or of value on their computers risk getting caught up in espionage and other cyber capers. For instance, hackers can use their computers as vehicles for staging attacks or as a location for storing illicit files, such as child pornography. And as more cell phones and PDAs connect to the Internet, the risks multiply.

What may be disturbing to some readers is that every computer device and peripheral provides at least one avenue of attack. The author explains many of these schemes, such as keystroke loggers and cleartext file transfers via file transfer protocol (FTP). In addition, operating-system and application-level vulnerabilities constitute even more ways that systems can be compromised.

Despite the grim picture painted by the author, the book isn't intended to make readers paranoid, but rather to acquaint them with the many risks posed by the Internet. This excellent book shows that someone quite possibly is out to get you, but it provides the tools to protect yourself.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback