Two leading computer cops show how to use computer forensics--methodical processes and techniques for collecting, sorting, and analyzing computer misuse. Aimed at cyber avengers, this book fills the gap between all the Internet security books and the contingency planning and recovery when an incident happens.
Read More
Two leading computer cops show how to use computer forensics--methodical processes and techniques for collecting, sorting, and analyzing computer misuse. Aimed at cyber avengers, this book fills the gap between all the Internet security books and the contingency planning and recovery when an incident happens.
Read Less