After the break‐in occurs: how to handle the student hacker

Date01 April 1997
Pages92-95
Published date01 April 1997
DOIhttps://doi.org/10.1108/07378839710307331
AuthorScott Muir
Subject MatterInformation & knowledge management,Library & information science

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT