End-user Computer Security/Appendix/Example set-ups & implementations
Appearance
End-user Computer Security
Inexpensive security
for |
⦾ individuals |
|
Footnotes
Appendix: Part 1 New security inventions requiring a non‑trivial investment in new technology |