"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This . . . book [is for] readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security"--Provided by publisher.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
1333239 | 4997238 | 2181 | 737528 | 898629 | PIBR | 382 | PIBR080586 | 364.16 ROD | 364.16 | 1581465224 | 1708963493 |