Cyber attacks, counterattacks, and espionage

"In this ... book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime"--Amazon.com.

9781508173168
book

Holdings

hidmidmiidnidwidlocation_codelocationbarcodecallnumdeweycreatedupdated
124204449176402310598105794547FAMD178FAMD27940364.16 HAR364.1615814652241736518457
131962249846412319598105794547PEHS370PEHS69342364.168 HAR364.1615814652241736518457
202028055998642228598105794547GROH243GROH040479364.16 HAR364.1615825759371709307855
207987256545062232598105794547HIHS255HIHS053881364.16 HAR364.1615825759371709307855
307291165245502412598105794547PMH360PMS0081522364.16 HAR364.1616377825731736800991
373445970536312336598105794547RHRO407RHJH811534364.16 HAR364.1616927942501736518457