|
|
|
|
|
|
a closer look at why they do it and how they do it
|
|
examining the impact on corporations, government and national security; links on cyberterrorism
|
|
the focus on new laws, liability proposals and software makers like microsoft
|
|
tips on how to safeguard your computer files and personal data
|
|
with 4 hackers and 14 security analysts in government and the private sector |