Provides a history of computer security breaches, explores current and future threats, and offers information on how to combat security risks.[...]