Introduction to Secure Processing
Every week, we read new stories of “cyber attacks” breaching information systems and exposing critical information to theft or misuse. The problem is getting worse not better. Graphical tools like “Sam Spade” are freely available and very powerful for hacking. More worrisome are professional cyber criminals who’ve become well established in host countries and are hiring sophisticated engineering talent.
Please disable any pop-up blockers for proper viewing of this Whitepaper.