Book description
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the
Table of contents
- Front Cover
- Contents (1/2)
- Contents (2/2)
- About the Author
- Introduction
- 1. China: The Red Dragon of Economic Espionage (1/5)
- 1. China: The Red Dragon of Economic Espionage (2/5)
- 1. China: The Red Dragon of Economic Espionage (3/5)
- 1. China: The Red Dragon of Economic Espionage (4/5)
- 1. China: The Red Dragon of Economic Espionage (5/5)
- 2. We Are Not Alone: Economic Espionage and the World (1/2)
- 2. We Are Not Alone: Economic Espionage and the World (2/2)
- 3. The Background of Economic Espionage (1/2)
- 3. The Background of Economic Espionage (2/2)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (1/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (2/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (3/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (4/5)
- 4. PRC Acquisition of US Technology*: An Overview and Short History (5/5)
- 5. Chinese Product Piracy and Counterfeiting* (1/2)
- 5. Chinese Product Piracy and Counterfeiting* (2/2)
- 6. Who, What, and How China Targets* (1/4)
- 6. Who, What, and How China Targets* (2/4)
- 6. Who, What, and How China Targets* (3/4)
- 6. Who, What, and How China Targets* (4/4)
- 7. The China Spy Guide and Open-Source Information (1/3)
- 7. The China Spy Guide and Open-Source Information (2/3)
- 7. The China Spy Guide and Open-Source Information (3/3)
- 8. The Intelligence Cycle and Collection Effort (1/2)
- 8. The Intelligence Cycle and Collection Effort (2/2)
- 9. Corporate Rivals (1/2)
- 9. Corporate Rivals (2/2)
- 10. Sources of Information* (1/5)
- 10. Sources of Information* (2/5)
- 10. Sources of Information* (3/5)
- 10. Sources of Information* (4/5)
- 10. Sources of Information* (5/5)
- 11. The Economic Espionage Act (1/2)
- 11. The Economic Espionage Act (2/2)
- 12. The U.S. Response to Economic Espionage (1/4)
- 12. The U.S. Response to Economic Espionage (2/4)
- 12. The U.S. Response to Economic Espionage (3/4)
- 12. The U.S. Response to Economic Espionage (4/4)
- 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (1/2)
- 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (2/2)
- 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (1/3)
- 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (2/3)
- 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (3/3)
- 15. Internet Exploitation: The Web, Your Computer, Your IT System (1/2)
- 15. Internet Exploitation: The Web, Your Computer, Your IT System (2/2)
- 16. Protecting Your Data (1/6)
- 16. Protecting Your Data (2/6)
- 16. Protecting Your Data (3/6)
- 16. Protecting Your Data (4/6)
- 16. Protecting Your Data (5/6)
- 16. Protecting Your Data (6/6)
- 17. Source Documents and Other Resources (1/3)
- 17. Source Documents and Other Resources (2/3)
- 17. Source Documents and Other Resources (3/3)
- Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (1/2)
- Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (2/2)
- Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (1/2)
- Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (2/2)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (1/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (2/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (3/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (4/5)
- Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (5/5)
- Appendix D: Special 301 Report, China (1/3)
- Appendix D: Special 301 Report, China (2/3)
- Appendix D: Special 301 Report, China (3/3)
Product information
- Title: Trade Secret Theft, Industrial Espionage, and the China Threat
- Author(s):
- Release date: December 2013
- Publisher(s): CRC Press
- ISBN: 9781439899397
You might also like
book
Securing Open Source Libraries
Open source software is amazing, but it’s also a complicated beast when it comes to ownership, …
book
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual …
book
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2nd Edition
While forensic analysis has proven to be a valuable investigative tool in the field of computer …
book
The Basics of Information Security, 2nd Edition
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental …