000 01906cam a22003254a 4500
005 20250918123512.0
008 101126s2009 mauak bi 001 0 eng
020 _a9780750679954 (pbk.)
_cRM178.76
020 _a0750679956 (pbk.)
039 9 _a201012220914
_bariff
_c201011261415
_drahah
_y11-26-2010
_zrahah
040 _aUKM
090 _aKF.S435
090 _aKF
_b.S435 2009
245 0 0 _aSecuring intellectual property :
_bprotecting trade secrets and other information assets
260 _aBurlington, MA :
_bButterworth-Heinemann/Elsevier,
_c2009
300 _axvii, 270 p. :
_bill., forms ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 0 _aElements of a holistic program -- Trade secrets and nondisclosure agreements -- Confidentiality, rights transfer, and noncompetition agreements for employees -- IT services : development, outsourcing, and consulting -- How to sell your intellectual property protection program -- Case study : the myserious social engineering attacks on entity X -- When insiders and/or competitors target a business's intellectual property -- When piracy, counterfeiting, and organized crime target a business's intellectual property -- Physical security : the'duh' factor -- Protecting intellectual property in a crisis situation -- Top ten ways to shut down hackers.
650 0 _aIntellectual property
_zUnited States
_xCriminal provisions.
650 0 _aData protection
_xLaw and legislation
_zUnited States.
650 0 _aCopyright and electronic data processing
_xLaw and legislation
_zUnited States
650 0 _aTrade secrets
_zUnited States
710 2 _aButterworth-Heinemann (Firm)
907 _a.b14845088
_b2021-05-28
_c2019-11-12
942 _c01
_n0
_kKF.S435
914 _avtls003445925
991 _aFakulti Teknologi & Sains Maklumat
998 _at
_b2010-01-11
_cm
_da
_feng
_gmau
_y0
_z.b14845088
999 _c471132
_d471132