Securing Intellectual Property

CHF 85.15
Auf Lager
SKU
9TSBHG73QOB
Stock 1 Verfügbar
Free Shipping Kostenloser Versand
Geliefert zwischen Mi., 15.10.2025 und Do., 16.10.2025

Details

Klappentext Computer technologies have been embraced by everyone and are used to create, store and transmit data very quickly and efficiently. From a business perspective this is a wonderful advancement, but from a security perspective this is frightening. Trade secrets and other proprietary information can be easily disseminated with the click of a mouse. This book outlines threats to trade secrets that are often overlooked by security professionals, and shows specific, concrete steps to minimize these threats. Threats addressed include portable and covert storage devices, daily activities that seem harmless but can lead to loss of proprietary information, wireless networks, and deleted and residual data that can easily be recovered. Numerous legal issues are discussed such as the concept of inevitable disclosure as well as federal statutes such as the Economic Espionage Act, and the Computer Fraud and Abuse Act. The approach will provide a unique perspective, different from other books on t Zusammenfassung Most employers are astounded at how easily and quickly their proprietary information can get out of their control. This book offers solutions to common intellectual property problems facing security managers! computer security professionals! corporate legal counsel! and human resource managers. Inhaltsverzeichnis ForewordPreface Chapter 1 :Elements of a Holistic Program Chapter 2 : Trade Secrets and Nondisclosure Agreements Chapter 3 : Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees Chapter 4 : IT Services-Development, Outsourcing, and Consulting Chapter 5 : How to Sell Your Intellectual Property Protection Program Chapter 6 : Case Study: The Mysterious Social Engineering Attacks on Entity X Chapter 7 : When Insiders and/or Competitors Target a Business's Intellectual Property Chapter 8 : When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property Chapter 9 : Physical Security: The "Duh? Factor Chapter 10 : Protecting Intellectual Property in a Crisis Situation Chapter 11 : Top Ten Ways to Shut Down Hackers Appendix 1 : Mutual Non-Disclosure Agreement Appendix 2 : Evaluation Agreement (Pro-Recipient) Appendix 3 : Employee Agreement Appendix 4 : Software Development Agreement Appendix 5 : Software Consulting Agreement (Favors Consultant) Appendix 6 : Software Consulting Agreement (Favors Customer) Appendix 7 : Web Site Development Agreement Appendix 8 : Web Hosting Agreement Appendix 9 : U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense...

Zusammenfassung
Most employers are astounded at how easily and quickly their proprietary information can get out of their control. This book offers solutions to common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers.

Inhalt

ForewordPreface Chapter 1:Elements of a Holistic ProgramChapter 2: Trade Secrets and Nondisclosure AgreementsChapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for EmployeesChapter 4: IT Services-Development, Outsourcing, and ConsultingChapter 5: How to Sell Your Intellectual Property Protection ProgramChapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity XChapter 7: When Insiders and/or Competitors Target a Business's Intellectual PropertyChapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual PropertyChapter 9: Physical Security: The "Duh? FactorChapter 10: Protecting Intellectual Property in a Crisis SituationChapter 11: Top Ten Ways to Shut Down HackersAppendix 1: Mutual Non-Disclosure AgreementAppendix 2: Evaluation Agreement (Pro-Recipient)Appendix 3: Employee AgreementAppendix 4: Software Development AgreementAppendix 5: Software Consulting Agreement (Favors Consultant)Appendix 6: Software Consulting Agreement (Favors Customer)Appendix 7: Web Site Development AgreementAppendix 8: Web Hosting AgreementAppendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense

Cart 30 Tage Rückgaberecht
Cart Garantie

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09780750679954
    • Sprache Englisch
    • Größe H235mm x B191mm x T22mm
    • Jahr 2008
    • EAN 9780750679954
    • Format Kartonierter Einband
    • ISBN 978-0-7506-7995-4
    • Veröffentlichung 09.12.2008
    • Titel Securing Intellectual Property
    • Autor Information Information Security
    • Untertitel Protecting Trade Secrets and Other Information Assets
    • Gewicht 570g
    • Herausgeber Butterworth-Heinemann
    • Anzahl Seiten 288
    • Genre Management

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.