Computer Forensics: Computer . . .
Use attributes for filter ! | |
Google books | books.google.com |
---|---|
Originally published | 2002 |
Authors | John R. Vacca |
Date of Reg. | |
Date of Upd. | |
ID | 2129708 |
About Computer Forensics: Computer . . .
Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and include fraud, copyright infringement, and stolen data. . . .