Notes

Part I Boot Camp: Privacy Means Profit

Chapter 1 Motivate the Troops

[1]

[2]

[3]

[4]

[5]

[6]

Chapter 2 Define the Problem

[7]

[8]

[9]

Part II Basic Training: Think Like a Spy

Chapter 4 The First Mind-Set: Eliminate the Source

[10]

Chapter 5 The Second Mind-Set: Destroy the Data

[11]

[12]

Chapter 6 The Third Mind-Set: Secure the Systems

[13]

[14]

[15]

Chapter 7 The Fourth Mind-Set: Lock the Docs

[16]

[17]

Chapter 9 The Sixth Mind-Set: Interrogate the Enemy

[18]

Chapter 10 The Seventh Mind-Set: Monitor the Signs

[19]

Part III Field Combat: Target the Enemy

Chapter 11 Deploy Targeting Strategies: Accumulate, Prioritize, and Adapt

[20]

[21]

[22]

[23]

[24]

[25]

Chapter 12 Defend Online Identity: Social Networking and the Cloud

[26]

[27]

[28]

[29]

[30]

[31]

[32]

[33]

[34]

[35]

[36]

[37]

[38]

[39]

[40]

[41]

Chapter 13 Protect Mobile Data: Laptop Responsibility

[42]

[43]

Chapter 15 Recover Your Identity: When All Else Fails

[44]

[1] "Estimates Put T.J. Maxx Security Fiasco At $4.5 Billion," Information Week, May 2, 2007, citing research conducted by IP Locks, a compliance and database security company, and the Ponemon Institute, an independent research company. www.informationweek.com/news/security/showArticle.jhtml?articleID=199203277.

[2] www.finance.yahoo.com, February 24, 2009.

[3] "Fifth Annual U.S. Cost of Data Breach Study," Ponemon Institute, 2010, p. 4.

[4] "Data Breach Defense 2009," Javelin Strategy & Research, March 3, 2009.

[5] "2009 Data Breach Investigations Report," Verizon Business, April 15, 2009.

[6] "Data Breach Defense 2009," ...

Get Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.