Information Security | Securing Intellectual Property | Buch | 978-0-7506-7995-4 | sack.de

Buch, Englisch, 288 Seiten, Format (B × H): 190 mm x 235 mm, Gewicht: 586 g

Information Security

Securing Intellectual Property

Protecting Trade Secrets and Other Information Assets
Erscheinungsjahr 2008
ISBN: 978-0-7506-7995-4
Verlag: Elsevier Science

Protecting Trade Secrets and Other Information Assets

Buch, Englisch, 288 Seiten, Format (B × H): 190 mm x 235 mm, Gewicht: 586 g

ISBN: 978-0-7506-7995-4
Verlag: Elsevier Science


Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the "spy vs. spy� perspective. The author approaches the topic from a practical business perspective and not simply creating "paranoia� for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
Information Security Securing Intellectual Property jetzt bestellen!

Zielgruppe


PRIMARY MARKET:
CSO's and security consultants, loss prevention directors, computer security managers and staff, physical security experts, corporate counsels, and computer security consultants.

SECONDARY MARKET:
Investigative law enforcement, human resource professionals, legal professionals (intellectual property lawyers), and students in security and computer security.

Weitere Infos & Material


ForewordPreface Chapter 1:Elements of a Holistic ProgramChapter 2: Trade Secrets and Nondisclosure AgreementsChapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for EmployeesChapter 4: IT Services-Development, Outsourcing, and ConsultingChapter 5: How to Sell Your Intellectual Property Protection ProgramChapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity XChapter 7: When Insiders and/or Competitors Target a Business's Intellectual PropertyChapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual PropertyChapter 9: Physical Security: The "Duh� FactorChapter 10: Protecting Intellectual Property in a Crisis SituationChapter 11: Top Ten Ways to Shut Down HackersAppendix 1: Mutual Non-Disclosure AgreementAppendix 2: Evaluation Agreement (Pro-Recipient)Appendix 3: Employee AgreementAppendix 4: Software Development AgreementAppendix 5: Software Consulting Agreement (Favors Consultant)Appendix 6: Software Consulting Agreement (Favors Customer)Appendix 7: Web Site Development AgreementAppendix 8: Web Hosting AgreementAppendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.