Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacksDives deeply into relevant technical and factual information from an insider's point of viewDetails the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
About Jason Andress
See more books from this Author
Published July 13, 2011
Computers & Technology.