Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Presents information in forensic computing and IT security. This volume offers practical insight to security and its importance in design, implementation, and the maintenance of systems. It provides guidance on creating systems that allow data to be gathered for future investigation of an event.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.