"Du læser ikke om os i aviserne, Du ser aldrig reklame for vores produkter i blade eller på tv. Vi er nærmest usynlige", lyder det fra en... Læs mere
Presents a open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict. This title serves as a useful reference to policymakers, China specialists, and information operations professionals.
Essential reading for launching a career in computer forensics Internet crime is on the rise, catapulting the need for computer forensics specialists.... Læs mere
Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test.
The federal computer fraud and abuse statute, 18 U S C 1030, outlaws conduct that victimises computer systems. It is a computer security law. It protects... Læs mere