The quiet threat : fighting industrial espionage in America /
"Industrial espionage is a craft that has evolved over the centuries that remains persistent in its threat. History has shown us that the techniques used today are adaptations of those developed in the sixteenth century and honed through the twentieth century. Accordingly, the text focuses on t...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Springfield, Ill. :
Charles C Thomas,
2003.
|
| Subjects: |
| LEADER | 02429cam a22003858a 4500 | ||
|---|---|---|---|
| 001 | c000401613 | ||
| 003 | CARM | ||
| 005 | 20190213115252.0 | ||
| 008 | 190213s2003 ilu b 001 0 eng | ||
| 010 | |a 2002043567 | ||
| 019 | 1 | |a 24224764 |5 LACONCORD2021 | |
| 020 | |a 0398073899 (hard) | ||
| 020 | |a 0398073902 (pbk.) | ||
| 035 | |a (OCoLC)51059230 |5 LACONCORD2021 | ||
| 040 | |a DLC |b eng |c DLC |d OrLoB-B |d DLC | ||
| 042 | |a pcc | ||
| 043 | |a n-us--- | ||
| 050 | 0 | 0 | |a HD38.7 |b .M456 2003 |
| 082 | 0 | 0 | |a 658.4/7 |2 21 |
| 100 | 1 | |a Mendell, Ronald L. | |
| 245 | 1 | 4 | |a The quiet threat : |b fighting industrial espionage in America / |c by Ronald L. Mendell. |
| 260 | |a Springfield, Ill. : |b Charles C Thomas, |c 2003. | ||
| 300 | |a ix, 198 p. ; |c 26 cm. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Ch. 1. The Factory Visit (Observation) -- Ch. 2. Knowledge -- Ch. 3. Beginnings in England -- Ch. 4. More Observation Techniques -- Ch. 5. Multi-Line Techniques -- Ch. 6. Power and Politics -- Ch. 7. Countermeasures -- Ch. 8. Internal Intelligence -- Ch. 9. External Intelligence -- Ch. 10. Investigating Cases. | |
| 520 | 1 | |a "Industrial espionage is a craft that has evolved over the centuries that remains persistent in its threat. History has shown us that the techniques used today are adaptations of those developed in the sixteenth century and honed through the twentieth century. Accordingly, the text focuses on the similarity of industrial spy craft through time with examples from Anglo-American history. This book will help security professionals to combat industrial (or corporate) espionage in the post-industrial information age by helping to understand its techniques. A primary goal of the book is in giving the reader a real sense of how industrial spies are persistent and clever in circumventing defenses."--BOOK JACKET. | |
| 650 | 0 | |a Business intelligence |z United States. | |
| 650 | 0 | |a Trade secrets |z United States. | |
| 650 | 0 | |a Industries |x Security measures |z United States. | |
| 852 | 8 | |b CARM |i C13498 |p 0651811 |f BK | |
| 852 | 8 | |b SCAN |h A3:AH03G0 |i C13498 |p 0651811 |f BK | |
| 852 | 8 | |b SCAN |h A3:AH03G0 |i C13498 |p 0651811 |f BK | |
| 999 | f | f | |i 3b54cafc-8fe0-538d-8d1c-30b6e5da64fc |s 91d355e7-5b4e-5abf-b445-d586d8dfd486 |
| 952 | f | f | |p Can circulate |a CAVAL |b CAVAL |c CAVAL |d CARM 1 Store |e C13498 |h Other scheme |i book |m 0651811 |
| 952 | f | f | |a CAVAL |b CAVAL |c CAVAL |d Unmapped Location |e C13498 |f A3:AH03G0 |h Other scheme |