BEWARE THE PREDATOR is an easy-to-read guide for anyone who wants to raise their security awareness and defensive posture. This book will help you understand how to protect yourself, your family and business from criminal predators, corporate intrusion, and State sponsored spying. Whether you are a corporate or government executive, a high-net-worth individual, or someone simply concerned about identity theft and personal safety, you should be aware of the vulnerabilities to your personal data and predatory attacks against your assets and relationships. This book provides practical ways to reduce your personal exposure and mitigate risk. Instead of trying to defeat the onslaught of technology with technology, Beware The Predator shows you how to use traditional personal security tradecraft techniques to reduce your exposure and enhance your security, while continuing to enjoy the conveniences of modern life. Beware the Predator provides simple processes you can use to help strengthen your security posture and present a hardened target to the predator.
"synopsis" may belong to another edition of this title.
As a career Technical Operations Officer, Mr. Warren Holston has worked throughout the Intelligence Community, Department of Defense, and defense industry for more than 30 years. He has served as a U.S. Navy Explosive Ordnance Disposal Diver, a collection officer and senior manager in the Central Intelligence Agency, and a Subject Matter Expert for the Department of Defense U.S. Special Operations Command. Mr. Holston has managed and conducted counterterrorism, covert action, and technical collection operations worldwide and is recognized as having contributed significantly to the national security of the United States of America. He was awarded the CIA’s Intelligence Commendation Medal for “conceiving of, and implementing, a clandestine sensor operation against a high priority denied area intelligence target” and the Distinguished Career Intelligence Medal for “superior performance in the conduct of clandestine operations in the CIA.”
"About this title" may belong to another edition of this title.
(No Available Copies)
If you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!Create a Want