Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Book, 2010
Current format, Book, 2010, , Available .
Book, 2010
Current format, Book, 2010, , Available . Offered in 0 more formats
Examines the physical security of computer hardware, networks, and digital data. Introduces the different forms of rogue software, discusses methods for preventing and defending against them, and describes a selection of viruses, worms, and Trojans in detail. Investigates threats to network security and explores the subjects of authentication, spyware, and identity theft. Discusses key issues about privacy and trust in the online world.--
From the community