<--- Back to Details
First PageDocument Content
Mobile device forensics / Forensic science / Subscriber identity module / Government procurement in the United States / Computer security / Security / Espionage / Digital forensics / Mobile computers / Information technology audit
Date: 2008-02-25 14:46:12
Mobile device forensics
Forensic science
Subscriber identity module
Government procurement in the United States
Computer security
Security
Espionage
Digital forensics
Mobile computers
Information technology audit

Add to Reading List

Source URL: www.cftt.nist.gov

Download Document from Source Website

File Size: 255,08 KB

Share Document on Facebook

Similar Documents

M-209 / Cryptography / Mathematics

r Secret Code Machines: The Inside Story The Eerie World of Espionage Ho,s Created Some Truly Strange Hsrdwsre!

DocID: 1xTmM - View Document

“Surveillance art” reassures us: It is better to be a little paranoid Like the creators of the “Conversnitch” project, the artists of “surveillance art”1 invite us to drive out the finks and other espionage t

DocID: 1vfwl - View Document

Susanne Knickmeier & Elisa Wallwaey Statistical Overview and First Findings of a Case Analysis of Industrial Espionage in Germany

DocID: 1v3WJ - View Document

Elisa Wallwaey Economic and Industrial Espionage in German SMEs Overview

DocID: 1uYr5 - View Document

An Exceptional Espionage Operation Tolkachev, A Worthy Successor a

DocID: 1uWy5 - View Document