Home :: Books :: Business & Investing  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing

Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Netspionage : The Global Threat to Information

Netspionage : The Global Threat to Information

List Price: $36.95
Your Price: $23.77
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: Excellent book for managers, executives, and ISOs.
Review: "Netspionage" or network enabled espionage as the authors defined this term is considering the competitive intelligence gathering and the various forms of espionage. "Netspionage" is a comprehensive coverage of a very important topic that worried many people of all sorts for years. It describes how technology has changed the rules of the game radically, and how both parties (information gathers and law enforcement authorities) use technology in this field. It also describes how criminals are adapting their techniques to the technical world while chasing the information , either on behalf of governments or international enterprises. Unlike most security books, this one is written for managers and executives in a very easy and clear language, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise. This book is giving a threat "awareness briefing" for managers and executives. It provides an easy to read and understand look at the competitive global business and information driven environment in which corporations must operate; as well as who is doing what to whom and why. Any one who is doing business in the global marketplace will need this book if he wants to gain or maintain a competitive edge. I read more than one book for the authors of this book (especially Dr. Kovacich), and I admire the way these books are organised and the language used. I recommend it with no conservation.

Rating: 5 stars
Summary: Excellent book for managers, executives, and ISOs.
Review: "Netspionage" or network enabled espionage as the authors defined this term is considering the competitive intelligence gathering and the various forms of espionage. "Netspionage" is a comprehensive coverage of a very important topic that worried many people of all sorts for years. It describes how technology has changed the rules of the game radically, and how both parties (information gathers and law enforcement authorities) use technology in this field. It also describes how criminals are adapting their techniques to the technical world while chasing the information , either on behalf of governments or international enterprises. Unlike most security books, this one is written for managers and executives in a very easy and clear language, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise. This book is giving a threat "awareness briefing" for managers and executives. It provides an easy to read and understand look at the competitive global business and information driven environment in which corporations must operate; as well as who is doing what to whom and why. Any one who is doing business in the global marketplace will need this book if he wants to gain or maintain a competitive edge. I read more than one book for the authors of this book (especially Dr. Kovacich), and I admire the way these books are organised and the language used. I recommend it with no conservation.

Rating: 0 stars
Summary: "Netspionage" is about global threats to information
Review: As we enter the 21st Century, it has become clear that the key asset that provides competitive advantage to a corporation competing in the global marketplace is the total array of knowledge and information available to it. Increasingly, the knowledge and sensitive proprietary information are generated, processed, stored, transmitted and obtained via networks and computer systems. "Netspionage" as described in the title is defined as network enabled espionage, and in our information systems world, it is a unique and interesting way of looking at and extending the old practice of competitive intelligence gathering and the various forms of espionage. The "information gatherers" of this new age are exploiting the dependency on technology for personal, corporate and national gain.

As hackers have demonstrated, computers and networked systems of every design are at risk of unauthorized intrusions. Already there have been cases that demonstrate that corporations are at risk to rivals willing to exploit the huge vulnerabilities that frequently exist in even the best systems. The fact is that network enabled espionage, spying and competitive intelligence gathering will become one of the most common tactics practiced by commercial organizations in the 21st century to find and obtain the information they need to gain that competitive edge or even to survive in this time of economic and business warfare.

"Netspionage" is a complete exposition on a topic that has fascinated readers of all sorts for years, spies and spying. It will describe how even in the dark recesses of the world's second oldest profession, technology has changed the game in ways that would have been unthinkable just a few short years ago. It also describes how the "spooks" are adapting their techniques to the world of the "techno-geeks" in their relentless pursuit of information to gain or sustain competitive advantage, whether on behalf of nation states or multi-national enterprises.

Unlike most security books, this one is written for managers and executives in non-protection roles of the corporation, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.

Rating: 5 stars
Summary: How to best protect and secure information
Review: In Netspionage: The Global Threat To Information, William Boni and Gerald Kovacich draw upon there many years of professional experience in corporate security and intelligence to describe and address Internet-based threats to information security. Very highly recommended, essential reading for anyone charged with corporate, government, or personal information security in this age of cyberspace hackers, terrorists, and espionage, Netspionage is a very practical and experience-based guide to the evolution of information collection and how to best protect and secure information from unwarranted and criminal attempts to access and corrupt corporate records, databases, projects, and trade secrets.

Rating: 5 stars
Summary: A 'Must Have' Reference Book ...
Review: Its impossible to mitigate threat if you can't first identify and articulate it to corporate leadership. This book by Bill Boni and Jerry Kovacich serves that function well and should earn a place on the bookshelves of all those involved in driving e-commerce as well as those responsible for computer network defense. Read it, use it to understand adversary threat (whether it be economic, industrial or military), understand its message, and learn from the real-world case studies.

Rating: 5 stars
Summary: A 'Must Have' Reference Book ...
Review: Its impossible to mitigate threat if you can't first identify and articulate it to corporate leadership. This book by Bill Boni and Jerry Kovacich serves that function well and should earn a place on the bookshelves of all those involved in driving e-commerce as well as those responsible for computer network defense. Read it, use it to understand adversary threat (whether it be economic, industrial or military), understand its message, and learn from the real-world case studies.

Rating: 0 stars
Summary: Netspionage - the Global Market's Competitive Edge
Review: This book is a carefully crafted "virtual boot camp" in Internet-enabled competitive intelligence gathering combined with a threat "awareness briefing " for managers and executives. The content was be taken from the "front lines" of the conflict between those committed to stealing information and those who defend it, and describes how to safely negotiate the "gray zone" to avoid ethical or operational mis-steps.

It is written in a clear and concise, non-technical manner from a manager's viewpoint for managers.

2. It provides an easy to read and understand look at the competitive global business and information driven environment in which corporations must operate; as well as who is doing what to whom and why.

3. If you do business in the global marketplace, this book is a "must-read", if you want to gain or maintain a competitive edge.

Rating: 1 stars
Summary: Wow, is this book poorly written.
Review: This book reads like the authors' notes for giving presentations - which I'm sure it is. There is a ton of repetition, and it obviously wasn't edited at all. Plus, the grammar and punctuation are what you might get if you asked a third grader to write with the dense verboseness and gobbledygook of a military tech-writer. This is the first book on the subject that I have read, and there was some good, basic information, as well as some unintentional laughs. But surely there are better books out there, at a better price. The hard information in this could have easily been condensed down to a pamphlet.

Rating: 1 stars
Summary: A waste of money
Review: This book serves as a primer for network espionage identification, control and a future studies. MBA and MIS students should see this on their required reading lists. This is not a technical book with over 2000 pages of source code, or a hacker novel. Yet through case studies and a demonstration of traditional intelligence gathering techniques (ethical and not) Boni and Kovacich prepare us to look into the future, and the present to protect our information assets.

Rating: 5 stars
Summary: I'll bet Tom Clancy read this book.
Review: This book serves as a primer for network espionage identification, control and a future studies. MBA and MIS students should see this on their required reading lists. This is not a technical book with over 2000 pages of source code, or a hacker novel. Yet through case studies and a demonstration of traditional intelligence gathering techniques (ethical and not) Boni and Kovacich prepare us to look into the future, and the present to protect our information assets.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates