Through profiles of individual victims and companies, this exploration of cyber crime identifies the commonly used criminal methods, such as viruses, spam, and junk e-mail, and the legal rights of... This description may be from another edition of this product.