A unique study of a technique of investigation of illegal access to computer information
Reviews 0
Secure deal
Instant delivery
Product description
This study is a compilation of forensic investigative techniques unauthorized access to information, as well as the classification and intelligible story about the actual new methods of unauthorized access to information.
Main features
- Content type File
- Content description 17,09 kB
- Added to the site 24.02.2003
Reviews
No reviews yet
Secure deal
Instant delivery
CADsoft
0
CADsoft
0