| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910827894803321 |
|
|
Autore |
Wimmer Bruce |
|
|
Titolo |
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Waltham, Massachusetts : , : Elsevier, , [2015] |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-12-420059-1 |
0-12-420054-0 |
|
|
|
|
|
|
|
|
Edizione |
[First edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (210 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage |
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation |
Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities |
|
|
|
|
|
|
|
|
|
|
|
Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training |
Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team |
Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed |
Develop Special Measures for Marketing and Sales Staff |
|
|
|
|
|
|
Sommario/riassunto |
|
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage. Shows how to identify a company’s threats, weaknesses, and most critical assets Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats Uses real-life case studies and examples to help the reader understand how to apply the tactics discussed |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910967008803321 |
|
|
Titolo |
Dead ringers : the remake in theory and practice / / edited by Jennifer Forrest and Leonard R. Koos |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Albany, : State University of New York Press, c2002 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (382 p.) |
|
|
|
|
|
|
Collana |
|
The SUNY series, cultural studies in cinema/video |
|
|
|
|
|
|
Altri autori (Persone) |
|
ForrestJennifer <1958-> |
KoosLeonard R. <1958-> |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Film remakes - History and criticism |
Motion pictures - History |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and indexes. |
|
|
|
|
|
|
Nota di contenuto |
|
CHAPTER ONE 1 -- Reviewing Remakes: An Introduction -- JENNIFER FORREST AND LEONARD R. KOOS -- CHAPTER TWO 37 -- Twice-Told Tales: Disavowal and the Rhetoric of the Remake -- THOMAS LEITCH -- CHAPTER THREE 63 -- Economy and Aesthetics in American Remakes of French Films -- MICHAEL HARNEY -- CHAPTER FOUR 89 -- The "Personal" Touch: -- The Original, the Remake, and the Dupe in Early Cinema -- JENNIFER FORREST -- CHAPTER FIVE 127 -- Sound Strategies: Lang's Rearticulation of Renoir -- TRICIA WELSCH -- CHAPTER SIX 151 -- The Raven and the Nanny: The Remake as Crosscultural Encounter -- ALAN WILLIAMS -- CHAPTER SEVEN 169 -- Sadie Thompson Redux: -- Postwar Reintegration of the Wartime Wayward Woman -- JENNIFER FORREST -- CHAPTER EIGHT 203 -- Hiring Practices: Simenon/Duvivier/Leconte -- LEONARD R. KOOS -- CHAPTER NINE 225 -- Twice Two: The Fly and Invasion of the Body Snatchers -- MARTY ROTH -- CHAPTER TEN 243 -- Three Takes On Motherhood, Masculinity, and Marriage: -- Serreau's Trois Hommes et un couffin, Nimoy's Remake, -- and Ardolino's Sequel -- CAROLYN A. DURHAM -- CHAPTER ELEVEN 273 -- Pretty Woman with a Gun: La Femme Nikita -- and the Textual Politics of "The Remake" -- LAURA GRINDSTAFF -- Appendix A -- Remaking Le Voile bleu: -- An Interview with Norman Corwin, Screenwriter for The Blue Veil 309 -- JENNIFER |
|
|
|
|
|
|
|
|
|
|
|
FORREST -- Appendix B -- Norman Corwin Letter to Jerry Wald 337 -- List of Contributors 341 -- Film Title Index 343 -- Name and Subject Index 353. |
|
|
|
|
|
|
Sommario/riassunto |
|
Addresses the important role of remakes in film culture, from early cinema to contemporary Hollywood. |
|
|
|
|
|
|
|
| |