 |
 |
 |
 |
 |
 |

a closer look at why they do it and how they do it
 |
 |

examining the impact on corporations, government and national security; links on cyberterrorism
 |
 |

the focus on new laws, liability proposals and software makers like microsoft
 |
 |

tips on how to safeguard your computer files and personal data
 |
 |

with 4 hackers and 14 security analysts in government and the private sector |