Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Chapter 4: Data Recovery
- Table 4.1: Comparison Of Various Tape Technologies.
Chapter 12: Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
- Table 12.1: Publicly identified foreign countries involved in economic espionage, information warfare: Initiatives and U.S. remediation.
Chapter 19: Advanced Computer Forensics
- Table 19.1: The salary protection racket.