Foreword.- Introduction.- Types of Disclosure.- Methods of Discovering Security Vulnerabilities.- Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions.- Other Legal and Ethical Issues.- Conclusion.- Glossary of Terms.- Appendix: Comparative Tables.