Abstract
Do not get too excited by the title of this chapter. I will not be going for the full “cloak and dagger” with the content here. There will be a little of that, but the focus here will be on how we, as essentially civilian defenders of civilian infrastructures, can use some of the knowledge and experience that various intelligence agencies have acquired since time immemorial.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Madsen, T. (2019). Employment of Secret Agents. In: The Art of War for Computer Security. Springer, Cham. https://doi.org/10.1007/978-3-030-28569-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-28569-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-28568-5
Online ISBN: 978-3-030-28569-2
eBook Packages: Computer ScienceComputer Science (R0)