Viruses, Vandalism, and Computer Crime

bullet

Describe techniques for avoiding, detecting, and eradicating a computer virus

bullet

Explain why special computer crime laws are necessary

SECTIONPREVIEW (cont’d)

Page 9-1

You will be able to:

Previous slide Next slide Back to first slide View graphic version