Most Popular Books
- Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
- Defending Iot Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
- Python Forensics
- Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity
- Integrating Python with Leading Computer Forensics Platforms