Print this page Share

Secrets of Computer Espionage: Tactics and Countermeasures

ISBN: 978-0-7645-3710-3
384 pages
June 2003
Secrets of Computer Espionage: Tactics and Countermeasures (0764537105) cover image


* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government
* Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals
* Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes
* Companion Web site contains links to security tools and useful security information resources
See More

Table of Contents



Chapter 1: Spies.

Chapter 2: Spying and the Law.

Chapter 3: Black Bag Jobs.

Chapter 4: Breaching the System.

Chapter 5: Searching for Evidence.

Chapter 6: Unprotecting Data.

Chapter 7: Copying Data.

Chapter 8: Snooping with Keyloggers.

Chapter 9: Spying with Trojan Horses.

Chapter 10: Network Eavesdropping.

Chapter 11: 802.11b Wireless Network Eavesdropping.

Chapter 12: Spying on Electronic Devices.

Chapter 13: Advanced Computer Espionage.

Appendix A: What's on the Web Site.


See More

Author Information

Joel McNamara is an internationally acclaimed security and privacy consultant and the creator of Private Idaho, one of the first popular open source Internet privacy tools. A former Microsoft technical writer and training manager, he is credited with developing one of the first Microsoft macro viruses and then publicizing the security risks. He is also the author of the "The Complete, Unofficial TEMPEST Information Page," a Web site that demystifies classified government surveillance technology.
See More


“…provides insightful details backed up by a wealth of real-life examples….clearly a valuable addition to your bookshelf…” (www.net-security.org, May 2004)

“…surprisingly clear given the degree of difficulty of his topic,…we suggest this practical book top managers…” (www.getabstract.com, May 2004)

"…an informative book which should help keep those defences up and those intruders out…" (PC Utilities, No.39, 2003)

“…will definitely open your eyes…quirky case studies and good coverage of latest technology…” (Internetworks, November 2003)

“…informative…entertaining…next time you go to your local bookseller, locate a copy. I bet you’ll be hooked…” (Linux Journal, 22 August 2003)

See More


Companion Site
Visit the Companion Site.
See More

Related Titles

Back to Top