After reading this chapter and completing the exercises, you will be able to do the following:
Know what is meant by industrial espionage
Understand the low-technology methods used to attempt industrial espionage
Be aware of how spyware is used in espionage
Know how to protect a system ...