- Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals
- Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes
- Companion Web site contains links to security tools and useful security information resources
Chapter 1: Spies.
Chapter 2: Spying and the Law.
Chapter 3: Black Bag Jobs.
Chapter 4: Breaching the System.
Chapter 5: Searching for Evidence.
Chapter 6: Unprotecting Data.
Chapter 7: Copying Data.
Chapter 8: Snooping with Keyloggers.
Chapter 9: Spying with Trojan Horses.
Chapter 10: Network Eavesdropping.
Chapter 11: 802.11b Wireless Network Eavesdropping.
Chapter 12: Spying on Electronic Devices.
Chapter 13: Advanced Computer Espionage.
Appendix A: What's on the Web Site.
“…surprisingly clear given the degree of difficulty of his topic,…we suggest this practical book top managers…” (www.getabstract.com, May 2004)
"…an informative book which should help keep those defences up and those intruders out…" (PC Utilities, No.39, 2003)
“…will definitely open your eyes…quirky case studies and good coverage of latest technology…” (Internetworks, November 2003)
“…informative…entertaining…next time you go to your local bookseller, locate a copy. I bet you’ll be hooked…” (Linux Journal, 22 August 2003)