Cybersecurity Breaches and Issues Surrounding Online Threat Protection

  • 7h 39m
  • Michelle Moore
  • IGI Global
  • 2017
Featuring extensive coverage across a range of relevant topics, such as robotics, cloud computing, and electronic data diffusion, this book is an essential reference for the latest scholarly research on the various types of unauthorized access or damage to electronic data.