“…provides insightful details backed up by a wealth of real-life examples….clearly a valuable addition to your bookshelf…” (www.net-security.org
, May 2004)
“…surprisingly clear given the degree of difficulty of his topic,…we suggest this practical book top managers…” (www.getabstract.com, May 2004)
"…an informative book which should help keep those defences up and those intruders out…" (PC Utilities, No.39, 2003)
“…will definitely open your eyes…quirky case studies and good coverage of latest technology…” (Internetworks, November 2003)
“…informative…entertaining…next time you go to your local bookseller, locate a copy. I bet you’ll be hooked…” (Linux Journal, 22 August 2003)
From the Back Cover
Is someone spying on you?
You might be surprised
It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agentor the whiz kid down the street. More and more people today want to know whats on your computer, your PDA, your cell phone, or your wireless network. And as soon as one vulnerable chink in your security is identified and plugged, a new spy tool or method will arise to circumvent the countermeasure.
Joel McNamara takes you inside the mind of the computer espionage artistamateur or professionaland shows you appropriate defenses for a wide array of potential vulnerabilities.
This is not just another book on network security. This is the book that teaches you to think like a spy, because thats the only way to outwit one.
- Analyze your risk of becoming a target of espionage
- Recognize and lock down the vulnerabilities of instant messaging, Web browsers, e-mail inboxes, and address books
- Understand where electronic eavesdropping becomes criminaland where its perfectly legal
- Discover how spies circumvent security measures and learn how to protect yourself
- Find out how law enforcement recovers evidence from a suspect computer
- See how a determined spy can compromise the average fax machine, paper shredder, cell phone, voice-mail, pager, PDA, and digital camera
- Learn how the government uses computer espionage techniques to combat drug lords, organized crime, foreign terrorists, and industrial espionage
- Explore some of the top-secret national spying projects like TEMPEST, ECHELON, Carnivore/DCS-1000, intelligence-gathering worms and viruses, and what impact they may have on you