Chapter 7

Computer and network security