Computer terrorists

The sale of this product is suspended.

Try to search similar items from other sellers.

Sold: 0
Uploaded: 16.01.2017
Content: text 43 symbols

Product description


Modern thieves and scammers use in their illegal activities of not only such vulgar methods as theft, robbery, but also more subtle methods using the latest achievements of science and technology. Here and wiretapping, and the installation of "bugs", including a unique laser devices and similar novelties.
One of the new crimes generated by scientific-technical progress are computer or "electronic" crimes.
In this book, given the facts, testifying that the threat of an information resource is increasing every day, plunging into a panic of the responsible persons in the banks, enterprises and companies around the world. "We live on a very dangerous bomb" — that is, to sum up, the leitmotif of many publications of the foreign press devoted to the growing power of electronic AIDS.

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.