This book examines technical aspects of industrial espionage and its impact in modern companies, organizations, and individuals while emphasizing the importance of intellectual property in the information era. The authors discuss the problem itself and then provide statistics and real world cases. The main contribution provides a detailed discussion of the actual equipment, tools and techniques concerning technical surveillance in the framework of espionage. Moreover, they present the best practices and methods of detection (technical surveillance counter measures) as well as means of...
This book examines technical aspects of industrial espionage and its impact in modern companies, organizations, and individuals while emphasizing t...
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems. The new edition includes a major update and extension to the VoIP sections in addition to updates to forensics.
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentialit...
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used against users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data...
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiali...