1
Descripción:
“... to detect evidence about the source of security attacks, so that it can subsequently be taken to a court...”
3
Autores Agudelo Torres, Gabriel Alberto, Palacios Gonzales, Cira del Carmen, Jiménez Gómez, Luis Miguel, Franco Ceballos, Luis Eduardo
Publicado 2017-05-24
Publicado 2017-05-24
14
16
17
18