Browse Items (1 total)

Main Argument: Many articles and reports focus on how cyber attacks have the potential to damage critical infrastructure. The authors of this book argue that cyber attacks can actually be used for security purposes as well. Rather than creating…

Tags: , , ,