Sold Out
Book Categories |
Computer fraud and misuse
password compromise and deception
a guide to investigative methods
computers, evidence and the law
backups and the continuity of evidence
the forensic examination of personal computers
multiple text search - the investigator's "A" bomb
investigating anonymous letters and computer-generated documents.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionComputer Evidence: A Forensic Investigations Handbook
X
This Item is in Your InventoryComputer Evidence: A Forensic Investigations Handbook
X
You must be logged in to review the productsX
X
X
Add Computer Evidence: A Forensic Investigations Handbook, The growth of computer automation has provided fraudsters, hackers and other criminals with new methods with which to commit forgery, impersonation, data manipulation, extortion, sabotage and theft. To the trained lawyer and investigator, however, compute, Computer Evidence: A Forensic Investigations Handbook to the inventory that you are selling on WonderClubX
X
Add Computer Evidence: A Forensic Investigations Handbook, The growth of computer automation has provided fraudsters, hackers and other criminals with new methods with which to commit forgery, impersonation, data manipulation, extortion, sabotage and theft. To the trained lawyer and investigator, however, compute, Computer Evidence: A Forensic Investigations Handbook to your collection on WonderClub |