The Co-operative University of Kenya

Securing intellectual property : protecting trade secrets and other information assets.

Contributor(s): Butterworth-Heinemann (Firm)Material type: TextTextSeries: SECURING INTELLECTUAL PROPERTYPublication details: Burlington, MA : Butterworth-Heinemann/Elsevier : Syngress/Elsevier, c2009Description: xvii, 270 p. : ill., forms ; 24 cmISBN: 9780750679954 (pbk.); 0750679956 (pbk.)Subject(s): Intellectual property -- United States -- Criminal provisions | Data protection -- Law and legislation -- United States | Copyright and electronic data processing -- Law and legislation -- United States | Trade secrets -- United StatesDDC classification: 346.7304/8 LOC classification: KF2979 | .S43 2009
Contents:
Elements of a holistic program -- Trade secrets and nondisclosure agreements -- Confidentiality, rights transfer, and noncompetition agreements for employees -- IT services : development, outsourcing, and consulting -- How to sell your intellectual property protection program -- Case study : the myserious social engineering attacks on entity X -- When insiders and/or competitors target a business's intellectual property -- When piracy, counterfeiting, and organized crime target a business's intellectual property -- Physical security : the "duh" factor -- Protecting intellectual property in a crisis situation -- Top ten ways to shut down hackers.
List(s) this item appears in: Creative Economy
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Book Book Nairobi
KF2979 .S43 2009 (Browse shelf(Opens below)) Available 2020-3716

"An information security reader."

Includes bibliographical references and index.

Elements of a holistic program -- Trade secrets and nondisclosure agreements -- Confidentiality, rights transfer, and noncompetition agreements for employees -- IT services : development, outsourcing, and consulting -- How to sell your intellectual property protection program -- Case study : the myserious social engineering attacks on entity X -- When insiders and/or competitors target a business's intellectual property -- When piracy, counterfeiting, and organized crime target a business's intellectual property -- Physical security : the "duh" factor -- Protecting intellectual property in a crisis situation -- Top ten ways to shut down hackers.

There are no comments on this title.

to post a comment.

© Cooperative University Library Karen, P. O. 24814-00502 Karen Nairobi Nairobi Kenya
Tel.: +254 020 8891401-4