Autor: Information Security
Wydawca: Elsevier
Dostępność: 3-6 tygodni
Cena: 305,55 zł
Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.
ISBN13: |
9780750679954 |
ISBN10: |
0750679956 |
Autor: |
Information Security |
Oprawa: |
Paperback |
Rok Wydania: |
2008-12-09 |
Tematy: |
LNR |
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have the “spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managersSample agreements and forms that address specific business needsCoverage of threats ranging from physical security lapses to hackers to social engineering
Foreword
Preface
Chapter 1:Elements of a Holistic Program
Chapter 2: Trade Secrets and Nondisclosure Agreements
Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
Chapter 4: IT Services—Development, Outsourcing, and Consulting
Chapter 5: How to Sell Your Intellectual Property Protection Program
Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property
Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property
Chapter 9: Physical Security: The “Duh Factor
Chapter 10: Protecting Intellectual Property in a Crisis Situation
Chapter 11: Top Ten Ways to Shut Down Hackers
Appendix 1: Mutual Non-Disclosure Agreement
Appendix 2: Evaluation Agreement (Pro-Recipient)
Appendix 3: Employee Agreement
Appendix 4: Software Development Agreement
Appendix 5: Software Consulting Agreement (Favors Consultant)
Appendix 6: Software Consulting Agreement (Favors Customer)
Appendix 7: Web Site Development Agreement
Appendix 8: Web Hosting Agreement
Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
Książek w koszyku: 0 szt.
Wartość zakupów: 0,00 zł
Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.
Al. Pokoju 29b/22-24
31-564 Kraków
Siedziba Księgarni
ul. Kordylewskiego 1
31-542 Kraków
+48 12 410 5991
+48 12 410 5987
+48 12 410 5989
Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.
© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.
Projekt i wykonanie: Alchemia Studio Reklamy