Securing Intellectual Property

Protecting Trade Secrets and Other Information Assets

Nonfiction, Reference & Language, Law, Intellectual Property, Business & Finance, Industries & Professions, Information Management
Cover of the book Securing Intellectual Property by Information Security, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Information Security ISBN: 9780080941417
Publisher: Elsevier Science Publication: December 9, 2008
Imprint: Butterworth-Heinemann Language: English
Author: Information Security
ISBN: 9780080941417
Publisher: Elsevier Science
Publication: December 9, 2008
Imprint: Butterworth-Heinemann
Language: English

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers

Sample agreements and forms that address specific business needs

Coverage of threats ranging from physical security lapses to hackers to social engineering

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers

Sample agreements and forms that address specific business needs

Coverage of threats ranging from physical security lapses to hackers to social engineering

More books from Elsevier Science

Cover of the book The Globalization of Chinese Business by Information Security
Cover of the book Numerical Methods in Electromagnetism by Information Security
Cover of the book Crude Oil Fouling by Information Security
Cover of the book Advances in Agronomy by Information Security
Cover of the book Advances in High-Pressure Techniques for Geophysical Applications by Information Security
Cover of the book Nerves and Nerve Injuries by Information Security
Cover of the book Protein-Protein Interactions in Human Disease, Part B by Information Security
Cover of the book Microbial Transformations of Steroids by Information Security
Cover of the book Elements of Oil and Gas Well Tubular Design by Information Security
Cover of the book Elliptic Boundary Value Problems of Second Order in Piecewise Smooth Domains by Information Security
Cover of the book The Biomaterials: Silver Jubilee Compendium by Information Security
Cover of the book New and Future Developments in Catalysis by Information Security
Cover of the book Natural History of Host-Parasite Interactions by Information Security
Cover of the book Minireviews of the Neurosciences from Life Sciences by Information Security
Cover of the book Comprehensive Biophysics by Information Security
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy