Table of Contents

  • Authors
  • Introduction
    • Your Enterprise at Risk
    • How to Read This Book
  • Part 1: The Challenge
    • Introduction
    • Chapter 1: The Tale of the Targeted Trojan
      • Introduction
      • The Haephrati Case
    • Chapter 2: When Insiders and/or Competitors Target a Business’s Intellectual Property
      • Introduction
      • Lightwave Microsystems
      • America Online
      • Casiano Communications
      • Corning and PicVue
      • Avery Dennison and Four Pillars
      • Lexar Media and Toshiba
      • SigmaTel and Citroen
      • 3dGEO – China
    • Chapter 3: When State Entities Target a Business’s Intellectual Property
      • Introduction
      • Airbus and Saudi Arabian Airlines
      • Russian Intelligence and Japanese Trade Secrets
      • Japan and the Cleveland Clinic Foundation
      • China and Russia: TsNIIMASH-Export
      • Overt Nation State Attempts: India, Venezuela, Brazil, and Others
      • Current and Future Threats to Economic Security
    • Chapter 4: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property
      • Introduction
      • Technology Counterfeiting
      • The Apparel Industry
      • The Entertainment Industry
    • Chapter 5: Virtual Roundtable on Intellectual Property and Economic Espionage
      • Introduction
      • The Legal Perspective: Naomi Fine
      • The OpSec Perspective: Keith Rhodes
      • The Professional Investigator’s Perspective: Ed Stroz
      • The DoD Cyber Sleuth’s Perspective: James Christy
      • The Security and Privacy Consultant’s Perspective: Rebecca Herold
  • Part 2: The Strategy
    • Introduction
    • Chapter 6: Elements of a Holistic Program
      • Introduction
      • False Memes Lead People the Wrong Way
      • From the

Details

No. of pages:
300
Language:
English
Copyright:
© 2008
Published:
Imprint:
Syngress
Print ISBN:
9781597492553
Electronic ISBN:
9780080558806