Summary of Secrets of Computer Espionage

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Secrets of Computer Espionage book summary
Start getting smarter:
or see our plans

Rating

9 Overall

10 Applicability

8 Innovation

8 Style


Recommendation

You and your computer face a dizzying array of security threats, writes tech consultant Joel McNamara. Competitors, cops, crooks and even disgruntled kin would love a peek at your hard drive. But don’t hyperventilate just yet. If you calmly analyze the desirability and vulnerability of your secrets, you can figure out how to protect yourself. McNamara’s prose is surprisingly clear given the degree of difficulty of his topic, and he offers a number of useful sidebars, charts and examples from inside the tech business to juice up his instructional tome. getAbstract.com suggests this practical book to managers charged with protecting corporate data, and to people who are unsure just how safe their computers are.

In this summary, you will learn

  • The security risks your sensitive data faces;
  • How to assess your risk; and
  • Some steps to help minimize the likelihood that you’ll be a victim.
 

About the Author

Consultant Joel McNamara has 20 years of experience in the computer industry. Formerly a technical writer and training manager at Microsoft, he developed one of the first Microsoft viruses to expose security risks. He is the creator of Private Idaho, an open source Internet privacy tool. McNamara also runs the Complete Unofficial TEMPEST Information Page, a Web site that explains government surveillance technology.

 

Summary

The Digital Spies All Around Us
The information technology revolution means computers house more and more secret information, whether it’s the business plan and customer list your corporate competitors would love to get their hands on, or the instant messaging chats that would make your...

More on this topic

Customers who read this summary also read

How to Encrypt Your Entire Life in Less than an Hour
How to Encrypt Your Entire Life in Less than an Hour
8
 How Quantum Physics Can Make Encryption Stronger
How Quantum Physics Can Make Encryption Stronger
7
How to Withstand a Cyberattack
How to Withstand a Cyberattack
8
The Malicious Use of Artificial Intelligence
The Malicious Use of Artificial Intelligence
8
Virtual Billions
Virtual Billions
8
The Hacked World Order
The Hacked World Order
9

Related Channels

Comment on this summary