Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
From short text messaging to war driving, this book explores various aspects of wireless technology. It provides a resource on the types of wireless crimes and forensic investigation techniques for wireless devices and wireless networks. It offers an understanding of modern wireless technologies, security techniques and wireless crime techniques.
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography began and evolved from ancient times. It also looks at the workings of digital steganography and watermarking methods and tools on the Internet.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.