Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
PRIMARY MARKET: CSO’s and security consultants, loss prevention directors, computer security managers and staff, physical security experts, corporate counsels, and computer security consultants.
SECONDARY MARKET: Investigative law enforcement, human resource professionals, legal professionals (intellectual property lawyers), and students in security and computer security.
Foreword Preface Chapter 1:Elements of a Holistic Program Chapter 2: Trade Secrets and Nondisclosure Agreements Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees Chapter 4: IT Services—Development, Outsourcing, and Consulting Chapter 5: How to Sell Your Intellectual Property Protection Program Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property Chapter 9: Physical Security: The “Duh” Factor Chapter 10: Protecting Intellectual Property in a Crisis Situation Chapter 11: Top Ten Ways to Shut Down Hackers Appendix 1: Mutual Non-Disclosure Agreement Appendix 2: Evaluation Agreement (Pro-Recipient) Appendix 3: Employee Agreement Appendix 4: Software Development Agreement Appendix 5: Software Consulting Agreement (Favors Consultant) Appendix 6: Software Consulting Agreement (Favors Customer) Appendix 7: Web Site Development Agreement Appendix 8: Web Hosting Agreement Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
- No. of pages:
- © Butterworth-Heinemann 2009
- 1st December 2008
- Paperback ISBN:
- eBook ISBN:
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.