"When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack."
Items must be returned in new or unused condition and contain all original materials included with the shipment. More details
FINAL SALE EXCLUSION: Items marked as FINAL SALE are not returnable unless the problem you experience is the result of our error.
* For your protection, all orders are screened for security purposes. If your order is selected for review, our Loss Prevention Team may contact you by phone or email. There may be a two business day delay to process your order.
** Most Oversize orders are delivered within 1-4 weeks. Some orders may take 6 weeks to be delivered.