Securing Intellectual Property

Protecting Trade Secrets and Other Information Assets

Nonfiction, Reference & Language, Law, Intellectual Property, Business & Finance, Industries & Professions, Information Management
Cover of the book Securing Intellectual Property by Information Security, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Information Security ISBN: 9780080941417
Publisher: Elsevier Science Publication: December 9, 2008
Imprint: Butterworth-Heinemann Language: English
Author: Information Security
ISBN: 9780080941417
Publisher: Elsevier Science
Publication: December 9, 2008
Imprint: Butterworth-Heinemann
Language: English

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers

Sample agreements and forms that address specific business needs

Coverage of threats ranging from physical security lapses to hackers to social engineering

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers

Sample agreements and forms that address specific business needs

Coverage of threats ranging from physical security lapses to hackers to social engineering

More books from Elsevier Science

Cover of the book Handbook of Flexible Organic Electronics by Information Security
Cover of the book Solid Fuel Blending by Information Security
Cover of the book Nucleosomes, Histones and Chromatin Part A by Information Security
Cover of the book Soft Drink and Fruit Juice Problems Solved by Information Security
Cover of the book Medicinal Chemistry of Anticancer Drugs by Information Security
Cover of the book Bayesian Data Analysis in Ecology Using Linear Models with R, BUGS, and Stan by Information Security
Cover of the book MATLAB for Neuroscientists by Information Security
Cover of the book Plasma Etching by Information Security
Cover of the book Immunoassay by Information Security
Cover of the book Flight Dynamics Principles by Information Security
Cover of the book Surface Production Operations: Vol 2: Design of Gas-Handling Systems and Facilities by Information Security
Cover of the book System Dynamics for Engineering Students by Information Security
Cover of the book Macroeconomics of Climate Change in a Dualistic Economy by Information Security
Cover of the book Object-Oriented Analysis and Design for Information Systems by Information Security
Cover of the book Nutritional and Herbal Therapies for Children and Adolescents by Information Security
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy