Secrets of Computer Espionage: Tactics and Countermeasures