End-user Computer Security/Appendix/Example set-ups & implementations
End-user Computer Security
Inexpensive security
|
for |
⦾ individuals |
|
|
Footnotes
| Appendix: Part 1 New security inventions requiring a non‑trivial investment in new technology |
.jpg)