34,46 €
38,29 €
-10% with code: EXTRA
Forensic Examination of Digital Evidence
Forensic Examination of Digital Evidence
34,46
38,29 €
  • We will send in 10–14 business days.
Developments in the world have shown how simple it is to acquire all sorts of information through the use of computers. This information can be used for a variety of endeavors, and criminal activity is a major one. In an effort to fight this new crime wave, law enforcement agencies, financial institutions, and investment firms are incorporating computer forensics into their infrastructure. From network security breaches to child pornography investiga- tions, the common bridge is the demon- stra…
  • SAVE -10% with code: EXTRA

Forensic Examination of Digital Evidence (e-book) (used book) | bookbook.eu

Reviews

(3.00 Goodreads rating)

Description

Developments in the world have shown how simple it is to acquire all sorts of information through the use of computers. This information can be used for a variety of endeavors, and criminal activity is a major one. In an effort to fight this new crime wave, law enforcement agencies, financial institutions, and investment firms are incorporating computer forensics into their infrastructure. From network security breaches to child pornography investiga- tions, the common bridge is the demon- stration that the particular electronic media contained the incriminating evidence. Supportive examination procedures and protocols should be in place in order to show that the electronic media contains the incriminating evidence.

EXTRA 10 % discount with code: EXTRA

34,46
38,29 €
We will send in 10–14 business days.

The promotion ends in 21d.06:22:13

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,38 Book Euros!?

Developments in the world have shown how simple it is to acquire all sorts of information through the use of computers. This information can be used for a variety of endeavors, and criminal activity is a major one. In an effort to fight this new crime wave, law enforcement agencies, financial institutions, and investment firms are incorporating computer forensics into their infrastructure. From network security breaches to child pornography investiga- tions, the common bridge is the demon- stration that the particular electronic media contained the incriminating evidence. Supportive examination procedures and protocols should be in place in order to show that the electronic media contains the incriminating evidence.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)