{"id":14497,"date":"2018-01-09T14:00:11","date_gmt":"2018-01-09T16:00:11","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=14497"},"modified":"2018-01-09T13:55:53","modified_gmt":"2018-01-09T15:55:53","slug":"industrial-espionage","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/industrial-espionage\/","title":{"rendered":"Industrial Espionage"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-14498\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2018\/01\/industrial-espionage.jpg\" alt=\"Industrial Espionage\" width=\"145\" height=\"229\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2018\/01\/industrial-espionage.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2018\/01\/industrial-espionage-95x150.jpg 95w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Daniel J. Benny<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition CRC Press<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target industrial trade secrets. And, although today\u2019s organizations face unprecedented threats to the security of their proprietary information and assets, most books on industrial espionage fail to supply guidelines for establishing a program to prevent and thwart such threats.<\/p>\n<p>Filling this need, Industrial Espionage: Developing a Counterespionage Program provides complete coverage of how to ensure the protection of company proprietary information and assets, including how to develop an effective corporate counterespionage program. The book presents the insights of a former veteran of the Office of Naval Intelligence.<\/p>\n<p>The book examines the motives behind industrial espionage and illustrates the variety of spy tradecraft utilized. Through the use of real-world case examples, the author provides guidelines to determine the current threat level to your organization\u2019s proprietary assets as well as the physical security countermeasures, policy, and procedures that must be in place to establish an effective counterespionage program.<\/p>\n<p>Outlining the day-to-day aspects of protecting sensitive data and trade secrets in a corporate security setting, this book is suitable for organizations that have proprietary information and assets to protect, businesses that have operations or partner with companies overseas such as China, organizations that work with the federal government on classified projects, security and counterespionage professionals, and university degree programs in Homeland Security and intelligence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Daniel J. Benny Maison d&#8217;\u00e9dition CRC Press R\u00e9sum\u00e9: The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target industrial trade secrets. And, although today\u2019s organizations face unprecedented threats to the security of their proprietary information and assets, most books on industrial espionage fail to supply guidelines for establishing a program to prevent and thwart such threats. Filling this need, Industrial&hellip; <\/p>\n","protected":false},"author":3,"featured_media":14498,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,19],"tags":[],"class_list":["post-14497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-risco-e-perdas"],"views":169,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/14497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=14497"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/14497\/revisions"}],"predecessor-version":[{"id":14499,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/14497\/revisions\/14499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/14498"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=14497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=14497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=14497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}