Internet warfare software: the eternal battlefield; internet attacks take many forms, but most of them exploit persistent software weaknesses.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Author(s): Anthes, Gary
  • Source:
    Computerworld. 2009, Vol. 43, Issue 17, pages. 5