Description
With constant headlines announcing the latest infiltration by hackers, it is more important than ever to be well informed on the topic. In this timely book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime. Readers will be as informed as they are captivated by cryptography s internet-age version of a criminal and crime-fighting story. (Source: Google Books API)
Show moreRate/Setting
Please log in to rate or offer books. Log in
Offers
Be the first to offer this book or check back later.
Only Offers/Searches from registered users with name will be displayed. Set up a name here to see your offers.
Offer this book
Log in to add your own offer, choose the format and describe delivery options.