"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This . . . book [is for] readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security"--Provided by publisher.