COVID-19 Update: We are currently shipping orders daily. However, due to transit disruptions in some geographies, deliveries may be delayed. To provide all customers with timely access to content, we are offering 50% off Science and Technology Print & eBook bundle options. Terms & conditions.
Netspionage - 1st Edition - ISBN: 9780750672573, 9780080512471


1st Edition

The Global Threat to Information

0.0 star rating Write a review
Authors: William C. Boni Gerald Kovacich
Paperback ISBN: 9780750672573
eBook ISBN: 9780080512471
Imprint: Butterworth-Heinemann
Published Date: 5th October 2000
Page Count: 280
Sales tax will be calculated at check-out Price includes VAT/GST

Institutional Subscription

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.

Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.

Key Features

*Practical guide written from front-line experience *Explains the evolution of information collection and why it has never been easier *Highlights the tools of the trade and how they can be put to best use


Information security professionals and security managers

Table of Contents

How Did We Get Here: Introduction to the New Old World; The Driving Force: High Technology; The Internet; The Global I-Way to Netspionage and Techno-Crime; The Global Business and Government Revolutions; A Short History of Espionage: Industrial, Economic, and Military; Who Does What to Whom and How: Competitive Intelligence and the Networked World; Information Collection in the Gray Zone; The Black Zone, Who Uses Netspionage, How and Why; Case Studies in Netspionage; Protecting What You Have from Those Who Want It: Defending Against Netspionage; Operational Security and Risk Management Techniques to Mitigate the Netspionage Threat; The Best Defense May Really Be a Good Offense and Other Issues; Based on Where We Have Been and Where We Are Now, Where Are We Going?: Future of Technology; Business, Crime, and Security in the 21st Century Global Marketplace; Future Netspionage; Business and Government Agencies - Shared Responsibilities; Epilog: We're All In This Together


No. of pages:
© Butterworth-Heinemann 2000
5th October 2000
Paperback ISBN:
eBook ISBN:

About the Authors

William C. Boni

Affiliations and Expertise

Director, Information Security for Motorola Corporation. He has worked as the Director of Information Protection Practices for Amgen; as a U.S. Army counterintelligence officer; federal agent and investigator; and a security consultant for such firms as PricewaterhouseCoopers and Ernst & Young

Gerald Kovacich

Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.

Affiliations and Expertise

Security consultant, lecturer, and author, Oak Harbor, WA, USA


"A unique contribution to an area of growing concern: the vulnerability of our information infrastructure. Netspionage offers both practical and theoretical insights into the global threat." -Dr. John W. King, Baldwin-Wallace College

Ratings and Reviews