starthere blogicon supporticon infoicon

main
Identity theft, password cracking, e-mail eavesdropping, network worms, computer sabotage, booby-trapped software,
digital piracy, online kiddie-porn trafficking, cyber-stalking, revenge hacking, and cyber-crime cartels. Life in the Internet age is
murder.
xml
My non-fiction book - IT Security Risk Control Management: An Audit Preparation Plan