Addresses the vulnerabilities of remotely accessible computerized information systems to electronic crime--penetration of the information system for illicit copying, altering, or destruction of selected information. A condensed survey of the probabl...