Attacks against information systems: an analysis of aspects related to illegal access |
Potential applications of advances in technology to prevention and response to cases of terrorism and criminality: the role of information and communication technologies |