|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: I.I. Androulidakis , Fragkiskos – Emmanouil KioupakisPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2016 Dimensions: Width: 15.50cm , Height: 1.00cm , Length: 23.50cm Weight: 3.376kg ISBN: 9783319286655ISBN 10: 331928665 Pages: 126 Publication Date: 16 February 2016 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsAndroulidakis and Kioupakis present an overview of the technical aspects of industrial espionage and of related countermeasures. ... This is a small book that can be read quickly, written in very simple terms and enriched by plenty of illustrations. Its elementary approach to technical matters makes it approachable to a vast audience of nontechnical readers whose business activities could be affected by the phenomenon of industrial espionage. (Alessandro Berni, Computing Reviews, December, 2016) Author InformationDr Iosif I. Androulidakis has an active presence in the ICT security field having authored more than 80 publications (including 4 books) and having presented more than 100 talks and lectures in international conferences and seminars in 20 countries. His research interests focus on security issues in fixed and mobile telephony systems where he has more than 20 years of experience. Mr Androulidakis holds a BSc in Physics and a PhD and an MSc in Electronics for which he was awarded the Greek State’s Scholarships Foundation outstanding performance prize. He also holds a second PhD in ICT from MPS Jozef Stefan, Slovenia. Fragkiskos – Emmanouil Kioupakis is a researcher regarding the subjects of information systems security, mobile security and malware and security rating methodologies. He has been a network engineer in a number of ISPs and his interests include the subjects of information security, security management, optical networking technologies and broadband access technologies. Tab Content 6Author Website:Countries AvailableAll regions |