Take time to get an overview of this complex topic and read definitions when you need to-- see resources on this page!
Be creative with your search terms. Different terms get different results – maybe just the results that you need.
Keep track of where you try searching & how. Remember, you are unlikely to find all the information you need in a single search! Use what you learn to create more targeted searches as you go.
Case studies of piracy, espionage, and computer hacking, along with strategies for addressing these risks for various types of organizations
NOTE: After clicking link, choose Read Full Text at Ebook Central > choose Towson U > search for book title