Computer terrorists

The sale of this product is temporarily suspended.

Sold: 0
Refunds: 0

Uploaded: 16.01.2017
Content: text (43 symbols)


Modern thieves and scammers use in their illegal activities of not only such vulgar methods as theft, robbery, but also more subtle methods using the latest achievements of science and technology. Here and wiretapping, and the installation of "bugs", including a unique laser devices and similar novelties.
One of the new crimes generated by scientific-technical progress are computer or "electronic" crimes.
In this book, given the facts, testifying that the threat of an information resource is increasing every day, plunging into a panic of the responsible persons in the banks, enterprises and companies around the world. "We live on a very dangerous bomb" — that is, to sum up, the leitmotif of many publications of the foreign press devoted to the growing power of electronic AIDS.


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)