Sign in

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications.

Enos K. MabutoHein S. Venter
Published in: ISC Int. J. Inf. Secur. (2012)
Keyphrases