Introduction : the study's central thrust -- Modern coercion conundrum -- Cases of state external brute force use -- Cases of state internal brute force use -- Brute force security impact patterns -- Conclusion : promising security paths.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.