-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CEH v10 Certified Ethical Hacker Study Guide
By :
The world of computing has long had the nature of a pendulum, particularly when it comes to where the computing power existed. Decades ago, in the 1960s and ’70s, there were service bureaus that companies went to when they had computing needs. This was because mainframes were far more expensive than most companies could afford or justify the expense. Businesses had to trust these service bureaus with their information in order to have their jobs performed, whether it was payroll or data merges for mailing lists or whatever the need happened to be.
When personal computers (PCs) became a thing, companies could buy one and have their very own computer systems to perform the jobs they needed to have run. This meant all data processing, such as it was known at the time, could be pulled back in house. So, the pendulum swung from outsourcing to in-housing. Eventually, the cost of the PC came down and the business could afford multiple systems, so data was stored on the...
Change the font size
Change margin width
Change background colour