Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
eBook, 2004
Current format, eBook, 2004, , All copies in use.
eBook, 2004
Current format, eBook, 2004, , All copies in use. Offered in 0 more formats
Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.
From the community