ABET DELA CRUZ

IN any computer security incident like intrusion, web page defacement, data leaks, and other type of hacking that results in a system compromise, the biggest challenge to determine the who, what, when, and why of the unfortunate event is the search for digital data that hopefully will yield clues.

Premium + Digital Edition

Ad-free access


P 80 per month
(billed annually at P 960)
  • Unlimited ad-free access to website articles
  • Limited offer: Subscribe today and get digital edition access for free (accessible with up to 3 devices)

TRY FREE FOR 14 DAYS
See details
See details