Автор: Пользователь скрыл имя, 28 Мая 2015 в 20:39, отчет по практике
More and more the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
These facts have not been lost on criminals or would-be criminals. A recent Stanford Research Institute study of computer abuse was based on 160 case histories, which probably are just the proverbial tip of the iceberg. After all, we only know about the unsuccessful crimes. How many successful ones have gone undetected is anybody's guess.
АНГЛИЙСКИЙ ТЕКСТ 3
Computer crimes 3
Communications Satellites 5
History of Telecommunications 8
ПИСЬМЕННЫЙ ПЕРЕВОД 13
Компьютерные преступления 13
Спутники связи 16
История Телекоммуникаций 20