z-logo
open-access-imgOpen Access
Peculiarities of Conducting an Investigative Review during the Investigation of Unauthorized Interference in the Operation of Computers, Automated Systems, Computer Networks or Telecommunication Networks
Author(s) -
B. Chernіakhovskyі
Publication year - 2020
Publication title -
naukovij vìsnik nacìonalʹnoï akademìï vnutrìšnìh sprav
Language(s) - English
Resource type - Journals
eISSN - 2410-3594
pISSN - 2786-7382
DOI - 10.33270/01201152.58
Subject(s) - computer science , digital forensics , digital evidence , computer security , novelty , telecommunications , analogy , philosophy , linguistics , theology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom