O'Reilly logo

Designing Network Security Second Edition by Merike Kaeo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B. Reporting and Prevention Guidelines: Industrial Espionage and Network Intrusions

In today's high-technology environment, thefts of proprietary material and network intrusions are a major organizational threat. This appendix is designed to help organizations develop the ability to prevent such proprietary theft and network intrusion—and, when they do occur, to know how to respond to recover their property and stop further intrusions. I hope you can review this information quickly and easily, and that it will function as a check list as you review your organization's needs. If you have questions regarding this appendix, please call or e-mail me at:

John C. SmithPrevention and Recovery ConsultingTrade Secret Theft and Network IntrusionsMountain View,  ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required