Secrets of computer espionage : tactics and countermeasures / Joel McNamara.

By: McNamara, JoelMaterial type: TextTextPublisher: New York : Wiley, 2003Description: xxi, 362 p. : ill. ; 24 cmISBN: 0764537105 (pbk.) :Subject(s): Computer security | Computer networks -- Security measures | Electronic surveillanceDDC classification: 005.8,MCN LOC classification: QA76.9.A25 | M436 2003Online resources: Contributor biographical information | Table of contents | Publisher description
Contents:
Apies (Page-1), Spying and the Law (Page-25), Black Bag Jobs (Page-47), Breaching the System (Page-67), Searching for Evidence (Page-95), Unprotected Data (Page-135), Copying Data (Page-163), Snooping with Kay loggers (Page-177), Spying with Trojan Horses (Page-205), Network Eavesdropping (Page-227), 802.11 b Wireless Network Eavesdropping (Page-259), Spying on Electronic Devices (Pages-289), Advanced Computer Espionage (Page-313).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,MCN (Browse shelf) Available Almirah No.9, Shelf No.1 MCS33701
Total holds: 0

Apies (Page-1), Spying and the Law (Page-25), Black Bag Jobs (Page-47), Breaching the System (Page-67), Searching for Evidence (Page-95), Unprotected Data (Page-135), Copying Data (Page-163), Snooping with Kay loggers (Page-177), Spying with Trojan Horses (Page-205), Network Eavesdropping (Page-227), 802.11 b Wireless Network Eavesdropping (Page-259), Spying on Electronic Devices (Pages-289), Advanced Computer Espionage (Page-313).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.