Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction. --subdivision Security measures under names of individual and types of computers, networks, and systems, e.g. IBM computers--Security measures
Here are entered works on the practice of breaking into computer systems and using techniques such as defacing or disabling Web sites, redirects, denial-of-service attacks, information theft, Web site parodies, etc., for politically or socially motivated purposes.