Filter
Hemmeligholdelse og databeskyttelse
Filter
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the …
This text takes a pared-down approach, illustrated through case studies, about the various and common security technologies that are used to secure a network and internet. …
Privacy issues come to the news every day. From big time break-ins to corporate and government computers to small time violations of e-mail or credit, there are real privacy …