1
by Shavers, Brett
Published 2013
Syngress
Table of Contents: ..., steganography, and deletion; Control of the device(s) in question.; Other devices used by suspectSoftware used...