𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Data mining: How hackers steal sensitive electronic information

✍ Scribed by Gordon Smith


Publisher
John Wiley and Sons
Year
2009
Tongue
English
Weight
55 KB
Volume
20
Category
Article
ISSN
1044-8136

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

You may want to rethink your electronic auditing procedures—and others—after you read this article. Computer security expert Gordon Smith reveals how hackers can easily penetrate your safeguards. © 2008 Canaudit Inc.