CIA, Inc. : espionage and the craft of business intelligence / F.W. Rustmann, Jr.
نوع المادة : نصالناشر:Washington, D.C. : Brassey's, [2002]تاريخ حقوق النشر: copyright 2002الطبعات:1st edوصف:xiii, 217 pages : 24 cmنوع المحتوى:- text
- unmediated
- volume
- 1574883887 (hbk)
- Espionage and the craft of business intelligence
- HD38.7 R87 2002
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HD38.7 R87 2002 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000073390 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HD38.7 R87 2002 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010000073389 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HD38.7 R87 2002 (إستعراض الرف(يفتح أدناه)) | C.3 | المتاح | 30010000073388 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
HD38.7 P4612 2003 وكر الجاسوسية : جاسوسية الشركات الامريكية / | HD38.7 .P745 2013 Principles and applications of business intelligence research / | HD38.7 .P745 2013 Principles and applications of business intelligence research / | HD38.7 R87 2002 CIA, Inc. : espionage and the craft of business intelligence / | HD38.7 R87 2002 CIA, Inc. : espionage and the craft of business intelligence / | HD38.7 R87 2002 CIA, Inc. : espionage and the craft of business intelligence / | HD38.7 S27 1999 التجسس الاقتصادي/ |
Includes bibliographical references and index.
Introduction: Sun Tzu and the art of (business) war -- PART 1: BUSINESS INTELLIGENCE: WHAT IT IS AND WHY WE NEED IT: The craft of business intelligence -- The importance of intelligence -- PART 2: THE COLLECTION PROCESS: The recruitment of spies -- Alternatives to recruitment -- Audio operations -- Computer databases and the Internet -- The importance of analysis -- PART 3: INFORMATION PROTECTION AND COUNTERINTELLIGENCE: Legal issues and the Economic Espionage Act of 1996 -- Economic intelligence, Chinese style -- Economic espionage and protection of intellectual property -- Source protection -- Corporate and financial fraud -- Employee vulnerability -- CIA defectors: how could they do it? -- PART 4: TERRORISM AND OTHER DANGERS ABROAD: International terrorism: going from bad to worse -- Doing business abroad -- Appendix: Computer databases.