Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.