Describes the science and technology concepts used by cyber attack investigators, including information on hackers, identity theft, firewalls, computer forensics, and data recovery.
Reviews with the most likes.
There are no reviews for this book. Add yours and it'll show up right here!