Describes examples of computer crime, discusses physical protection, passwords, security levels, data encryption, and identity tests, and assesses the vulnerability of computer systems
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want