Main image
Click to view image in fullscreen

calcActive())">
Conquest in Cyberspace
Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information, corrupt their workings, and shut them down. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.
650,00 DH
En stock
1) { qty = qty - 1 }">
Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information, corrupt their workings, and shut them down. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.
ISBN / EAN | 9780521871600 |
---|---|
Auteur | Libicki, Martin C. (RAND Corporation, California) |
Editeur | Cambridge University Press |