Skip to main content

Introduction to cyber security

This image shows an old-fashioned typewriter, but with a DVD drive and a mouse attached.

 3.4 End-of-life software