Sabotaging softwareEngaging in computer virus warfareConstrainsReducing program pollutionYet to rateProtecting critical infrastructureYet to rateConstrained byProtecting softwareYet to rateDetecting personal computer virusesYet to rate MetadataDatabaseGlobal strategiesType(G) Very specific strategiesSubjectundefined » Warundefined » Espionage, subversionundefined » InformaticsContent qualityYet to rate Yet to rateLanguageEnglishLast updateDec 3, 2024