Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
The second edition of this successful book shows how the contents of computer systems can be recovered for criminal evidence, even when hidden or subverted. Coverage includes Windows XP/2000 file systems, fast drives, new encryption technologies, and personal organisers.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.