The victim of an invisible attack -- What is at risk? -- Know the safeguards -- Play your part -- Spy games -- Hackers attack -- Imposters on the prowl -- Life after losing financial data.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.