Issue No.05 - September/October (2004 vol.6)
Wes Ames , Boeing
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2004.71
Spyware can sneak onto systems, monitoring them, capturing user data, and transmitting it to third parties. Find out how it works and how to guard against it.
Wes Ames, "Understanding Spyware: Risk and Response", IT Professional, vol.6, no. 5, pp. 25-29, September/October 2004, doi:10.1109/MITP.2004.71