A unique study of a technique of investigation of illegal access to computer information

  • USD
    • RUB
    • USD
    • EUR
i agree with "Terms for Customers"
Uploaded: 24.02.2003
Content: methods.zip 17,09 kB

Product description


This study is a compilation of forensic investigative techniques unauthorized access to information, as well as the classification and intelligible story about the actual new methods of unauthorized access to information.

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at [email protected] the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.