Deployment Strategies for Effective Encryption presentation from the 2010 Computer Forensics show, by Ben Rothke, April 2010.Lire moins