- Documento06-Computer Image Verification and Authenticationenviado porKranthi Kumar Ch
- Documento05-Duplication and Preservation of Digital Evidenceenviado porKranthi Kumar Ch
- Documento04 - Evidence Collection and Data Seizureenviado porKranthi Kumar Ch
- Documento03 - Data Recoveryenviado porKranthi Kumar Ch
- Documento02 - Types of Computer Forensics Technologyenviado porKranthi Kumar Ch
- Documento01 - Computer Forensics Fundamentalsenviado porKranthi Kumar Ch