"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This intriguing book will captivate readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security."-- Provided by publisher.
Note
Includes index.
Contents
The dark future -- Hack attack -- Connected and vulnerable -- Predators and prey -- Fighting cybercrime -- What next? -- Be a cybercrime specialist.
Study Program
Accelerated Reader AR MG 7.3 1 501820.
Note
Print version record and CIP data provided by publisher; resource not viewed.