Computer Forensics: Overview of Software Forensics

Introduction The number of instances and severity of computer-based attacks such as viruses and worms, Trojan horses, logic bombs, and plagiarism of software source code has become of increasing…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Fakhar Imam. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/BwGcAT0TXY8/