TY - BOOK TI - Deception technology PY - 2018/// KW - TERRORISM KW - TECHNOLOGY N2 - The article highlights the risk of sophisticated internal and external attacks has grown exponentially over the years. Today's security technologies seek primarily to defend a perimeter both firewalls and end point security cannot defend a perimeter 100% certainty ER -