Presents information in forensic computing and IT security. This volume offers practical insight to security and its importance in design, implementation, and the maintenance of systems. It provides guidance on creating systems that allow data to be gathered for future investigation of an event.
prečítať celé
Presents information in forensic computing and IT security. This volume offers practical insight to security and its importance in design, implementation, and the maintenance of systems. It provides guidance on creating systems that allow data to be gathered for future investigation of an event.
Skryť popis