000753780 000__ 02540cam\a2200469Ii\4500 000753780 001__ 753780 000753780 005__ 20230306141519.0 000753780 006__ m\\\\\o\\d\\\\\\\\ 000753780 007__ cr\cn\nnnunnun 000753780 008__ 160211s2016\\\\sz\\\\\\o\\\\\000\0\eng\d 000753780 020__ $$a9783319286662$$q(electronic book) 000753780 020__ $$a3319286668$$q(electronic book) 000753780 020__ $$z9783319286655 000753780 0247_ $$a10.1007/978-3-319-28666-2$$2doi 000753780 035__ $$aSP(OCoLC)ocn938557364 000753780 035__ $$aSP(OCoLC)938557364 000753780 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dYDXCP$$dN$T$$dGW5XE$$dIDEBK$$dEBLCP$$dAZU$$dOCLCF$$dCDX$$dDEBSZ$$dCOO 000753780 049__ $$aISEA 000753780 050_4 $$aHD38.7$$b.B4554 2016eb 000753780 08204 $$a658.4/72$$223 000753780 1001_ $$aAnulidakis, Iosif,$$eauthor. 000753780 24510 $$aIndustrial espionage and technical surveillance counter measurers$$h[electronic resource] /$$cIosif Androulidakis, Fragkiskos -- Emmanouil Kioupakis. 000753780 264_1 $$aCham :$$bSpringer,$$c2016. 000753780 300__ $$a1 online resource. 000753780 336__ $$atext$$btxt$$2rdacontent 000753780 337__ $$acomputer$$bc$$2rdamedia 000753780 338__ $$aonline resource$$bcr$$2rdacarrier 000753780 5050_ $$a1 Industrial Espionage -- 2 Eavesdropping discussions -- 3 Eavesdropping IT data -- 4 Landline telephony eavesdropping -- 5 Eavesdropping in mobile telephony -- 6 Protection against industrial espionage. 000753780 506__ $$aAccess limited to authorized users. 000753780 520__ $$aThis book examines technical aspects of industrial espionage and its impact in modern companies, organizations, and individuals while emphasizing the importance of intellectual property in the information era. The authors discuss the problem itself and then provide statistics and real world cases. The main contribution provides a detailed discussion of the actual equipment, tools and techniques concerning technical surveillance in the framework of espionage. Moreover, they present the best practices and methods of detection (technical surveillance counter measures) as well as means of intellectual property protection. 000753780 588__ $$aOnline resource; title from PDF title page (viewed February 16, 2016). 000753780 650_0 $$aConfidential business information. 000753780 650_0 $$aBusiness intelligence. 000753780 650_0 $$aTrade secrets. 000753780 650_0 $$aEspionage. 000753780 650_0 $$aBusiness enterprises$$xSecurity measures. 000753780 7001_ $$aKioupakis, Fragkiskos-Emmanouil,$$eauthor. 000753780 77608 $$iPrint version:$$z9783319286655 000753780 852__ $$bebk 000753780 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-28666-2$$zOnline Access$$91397441.1 000753780 909CO $$ooai:library.usi.edu:753780$$pGLOBAL_SET 000753780 980__ $$aEBOOK 000753780 980__ $$aBIB 000753780 982__ $$aEbook 000753780 983__ $$aOnline 000753780 994__ $$a92$$bISE