About this item

With constant headlines announcing the latest infiltration by hackers, it is more important than ever to be well informed on the topic. In this timely book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime. Readers will be as informed as they are captivated by cryptographys internet-age version of a criminal and crime-fighting story.



Read Next Recommendation

Report incorrect product information.