The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2004 vol. 6)
ISSN: 1520-9202
pp: 25-29
Wes Ames , Boeing
ABSTRACT
Spyware can sneak onto systems, monitoring them, capturing user data, and transmitting it to third parties. Find out how it works and how to guard against it.
INDEX TERMS
CITATION
Wes Ames, "Understanding Spyware: Risk and Response", IT Professional, vol. 6, no. , pp. 25-29, September/October 2004, doi:10.1109/MITP.2004.71
90 ms
(Ver )