Du er ikke logget ind
Beskrivelse
Terrorists use network technologies as they plan and stage attacks. This book explores the purpose and manner of the use of these technologies, their net effect, and security forces' possible responses.