Footnote:
Includes bibliographical references and index
Restricted to subscribers or individual electronic text purchasers
Description:
"This book offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks by calling for revolutionary protection strategies to reassess security"--Provided by publisher.