Crime Classification Manual Part II Chapter 10 A 23
Crime Classification Manual Part II Chapter 10 A 23
A STANDARD SYSTEM FOR INVESTIGATING AND
CLASSIFYING VIOLENT CRIMES SECOND EDITION
The targeted
computer should have its hard drive removed and analyzed by special computer
software to determine not only the changed data but search for possible Trojan
horse software that tests for data checks and then destroys the corrupted data
before they can be analyzed.
Comments
Post a Comment