Free Essay

How Dennis Was Identified Using Digital Forensic

In:

Submitted By Geryng
Words 724
Pages 3
HOW DIGITAL FORENSICS WAS USED TO IDENTIFY RADER

(Student’s Name)
(Professor’s Name)
(Course Title)
(Date of Submission)

Introduction
Dennis Lynn Rader’s case remains the longest case to be handled ever taking almost 30 years. His case was opened when he handed in a computer floppy to the police. Careful forensics carried out on the floppy revealed a document that had been edited by someone by the name Dennis in computers at the Christ Lutheran Church. This led to physical location of the suspect. To nail down the suspect as the BTN killer, DNA tests were carried out on Rader’s daughter, Kerri Rader and it was found to be matching. Comparing this to the DNA tests from the murder cases BTN killer emerged to be Rader. This was enough evidence to convict Rader for 10 murder cases.
Digital evidence uncovered from the floppy disk
Immediately Rader sent a floppy to the police containing Microsoft word document, the floppy was handed over to the computer forensic experts at the FBI for examinations. Inside the floppy was a file called “Test A.RTF.” The contents of the file read “This is a test. See 3x5 Card for details on communication with me in the newspaper.” The message referred to the card that was inside the same box that had the floppy. The officers further recovered a word document that had been deleted on the drive. Careful examination on the properties of the retrieved document showed that the document which had been modified on February 10th 2005 and had been revised on 14th February by the owner whose name was Dennis. The experts did a search on the church and found someone by the same name among the church attendants. Rader was found as the principal suspect and this led to a series of intensive investigation carried out on him.
Rader’s case took almost 30 years of investigation. This was because of the various games that Rader played on the police. For instance, in all his killings he made the police think that the killer had a different motive as compared to the previous killings. In one instance, a watch of a victim was missing while in another, the driver license was missing. Establishing the reason behind the killings was therefore varied and confusing. The letters that Rader kept sending to the media houses could not be used to develop a case against him since they were not original i.e. fifth generation copies. Rader then went underground for almost 13 years without any killings reported which made his detection difficult without any leads previously identified.
How digital evidence aided investigations
The acquisition of the computer floppy was actually a breakthrough in the radar’s case. It was from the floppy that opened way to link Rader to BTK killer. It was through the forensic examination on the floppy and DNA tests’ comparison from the murder cases to the suspect that made solid evidence. Were it not for this, BTK murder would still be a mystery to date.
Software used for evidence uncovering
EnCase software is the name of the application that led to the arrest of the serial killer. EnCase is a remote application that allows investigation to be carried out undetectably. It allows investigation to be carried out on many devices as well as acquiring enormous data from them using repeatable and defensible processes. Its results are court-accepted because of its power to uncover hidden evidences in digital devices. The software is able to give comprehensive reports of the analysis while maintaining the integrity of the evidence that is acceptable in a court of law.
Conclusion
It can generally be said that digital forensics when carefully undertaken it will definitely be almost impossible for criminals to commit crime and get away undetected. This is made very possible with the technology running the world where almost everything has been computerized. Mention mobile communications, social media platforms like Facebook and tweeter, internet and many more. Nothing is private anymore.

References www.edition.cnn.com, 2016. Daughter of BTK suspect alerted police. Retrieved from: http://edition.cnn.com/2005/US/02/26/btk.investigation/ www.murderpedia.org, 2016. Dennis Lynn RADER. Retrieved from: http://murderpedia.org/male.R/r/rader-dennis-bio-info.htm www.evolvediscovery.com, 2016. EnCase Forensics. Retrieved from:
http://www.evolvediscovery.com/technology/encase_forensics.php

Similar Documents

Free Essay

Computer Intrusion Forensics

...Computer Intrusion Forensics Research Paper Nathan Balon Ronald Stovall Thomas Scaria CIS 544 Abstract The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investigation. It is not enough to simple know an attacker is responsible for the crime, the forensics investigation must be carried out in a precise manner that will produce evidence that is amicable in a court room. For computer intrusion forensics many methodologies have been designed to be used when conducting an investigation. A computer forensics investigator also needs certain skills to conduct the investigation. Along with this, the computer forensics investigator must be equipped with an array of software tools. With the birth of the Internet and networks, the computer intrusion has never been as significant as it is now. There are different preventive measures available, such as access control and authentication, to attempt to prevent intruders. Intrusion detection systems (IDS) are developed to detect an intrusion as it occurs, and to execute countermeasures when detected...

Words: 9608 - Pages: 39

Premium Essay

Dna Testing

...DNA profiling (also called DNA testing, DNA typing, or genetic fingerprinting) is a technique employed by forensic scientists to assist in the identification of individuals by their respective DNA profiles. DNA profiles are encrypted sets of numbers that reflect a person's DNA makeup, which can also be used as the person's identifier. DNA profiling should not be confused with full genome sequencing.[1] It is used in, for example, parental testing and criminal investigation. Although 99.9% of human DNA sequences are the same in every person, enough of the DNA is different to distinguish one individual from another, unless they are monozygotic twins.[2] DNA profiling uses repetitive ("repeat") sequences that are highly variable,[2] called variable number tandem repeats (VNTR), particularly short tandem repeats (STR)s. VNTRs loci are very similar between closely related humans, but so variable that unrelated individuals are extremely unlikely to have the same VNTRs. The DNA profiling technique was first reported in 1984[3] by Sir Alec Jeffreys at the University of Leicester in England,[4] and is now the basis of several national DNA databases. Dr. Jeffreys's genetic fingerprinting was made commercially available in 1987, when a chemical company, Imperial Chemical Industries (ICI), started a blood-testing centre in England.[5] Contents [hide] 1 DNA profiling process 1.1 RFLP analysis 1.2 PCR analysis 1.3 STR analysis 1.4 AmpFLP ...

Words: 8205 - Pages: 33

Premium Essay

Policing

...ISSUE NO. 267 U.S. Department of Justice Office of Justice Programs National Institute of Justice National Institute of Justice JOURNAL Police Use of Force: The Impact of Less-Lethal Weapons and Tactics n Toward a Better Way to Interview Child Victims of Sexual Abuse Solving the Problem of Untested Evidence in Sexual Assaults Extending the Time to Collect DNA in Sexual Assault Cases Also in this issue In Brief: Block by Block: Zeroing in on Crime Trends Minimizing the Risks of Hazardous Materials: The CBRN Standard Improving Forensic Death Investigation In Brief: Expanding Research by Sharing Data n n i Building Knowledge to Meet the Challenge of CriMe and JustiCe National Institute of Justice John H. Laub Director, National Institute of Justice The NIJ Journal is published by the National Institute of Justice to announce the Institute’s policy-relevant research results and initiatives. The Attorney General has determined that publication of this periodical is necessary in transacting the public business of the U.S. Department of Justice as required by law. Findings and conclusions of the research reported here are those of the authors and do not necessarily reflect the official position or policies of the U.S. Department of Justice. All products, manufacturers and organizations cited in this publication are presented for informational purposes only, and their discussion does not constitute product approval or endorsement by the U.S. Department of Justice. Subscription...

Words: 19057 - Pages: 77

Premium Essay

A Guide to Forensic Accounting Investigation

...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...

Words: 246885 - Pages: 988

Premium Essay

Report

... . . . . . . . . . . . . . .4 Office of the Chief of Police . . . . . . . . . . . . . . .5 Strategic Plan Audit and Compliance Bureau Office of Internal Affairs Public Information Chief's Community Advisory Board Magnolia Station Grand Opening . . . . . . . . . .11 Riverside Police Department Facilities . . . . . .13 Administration Public Safety Communications . . . . . . . . . . . .14 Support Services . . . . . . . . . . . . . . . . . . . . . . .16 Personnel Bureau Training Bureau Management Services . . . . . . . . . . . . . . . . . .21 Finance Payroll Grants Administration Fleet Services Facilities Management Court Services Unit (CSU) Alarm Enforcement Unit (EAU) Records Management Front Counters/Telephone Report Unit Automation and Digital Records Crime Analysis Unit (CAU) Property/Evidence Unit Operations Field Operations . . . . . . . . . . . . . . . . . . . . . . .29 Neighborhood Policing Centers (NPCs) Management Accountability Program (RPD~MAP) Watch Commanders Problem Oriented Policing (POP) Bike Team El Protector University Neighborhood Enhancement Team (UNET) Crime Statistics Special Operations . . . . . . . . . . . . . . . . . . . . .39 Community Services Group Citizen Academy Crime Free Multi-Housing Neighborhood Watch Business Watch Youth Court METRO/SWAT & Aviation Special Weapons and Tactics (SWAT) Mobile Field Force (MFF) Emergency Negotiations Team (ENT) Aviation Unit Traffic Bureau Field Accident Investigators Police Motor Officers Major Accident Investigations...

Words: 22303 - Pages: 90

Premium Essay

Jan-Bebbington-Corporate-Social-Reporting-and-Reputation-Risk

...downloaded 10839 times since 2008* Users who downloaded this article also downloaded: Jeffrey Unerman, (2008),"Strategic reputation risk management and corporate social responsibility reporting", Accounting, Auditing & Accountability Journal, Vol. 21 Iss 3 pp. 362-364 Carol A. Adams, (2008),"A commentary on: corporate social responsibility reporting and reputation risk management", Accounting, Auditing & Accountability Journal, Vol. 21 Iss 3 pp. 365-370 Pekka Aula, (2010),"Social media, reputation risk and ambient publicity management", Strategy & Leadership, Vol. 38 Iss 6 pp. 43-49 Access to this document was granted through an Emerald subscription provided by 117974 [] For Authors If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information. About Emerald www.emeraldinsight.com Emerald is a global publisher linking research and practice to the benefit of...

Words: 16821 - Pages: 68

Premium Essay

Financial Accounting

...ACCOUNT CLASSIFICATION AND PRESENTATION Account Title Accounts Payable Accounts Receivable Accumulated Depreciation—Buildings Accumulated Depreciation—Equipment Advertising Expense Allowance for Doubtful Accounts Amortization Expense Bad Debt Expense Bonds Payable Buildings Cash Common Stock Copyrights Cost of Goods Sold Debt Investments Depreciation Expense Discount on Bonds Payable Dividend Revenue Dividends Dividends Payable Equipment Freight-Out Gain on Disposal of Plant Assets Goodwill Income Summary Income Tax Expense Income Taxes Payable Insurance Expense Interest Expense Interest Payable Interest Receivable Interest Revenue Inventory Classification A Current Liability Current Asset Plant Asset—Contra Plant Asset—Contra Operating Expense Current Asset—Contra Operating Expense Financial Statement Balance Sheet Balance Sheet Balance Sheet Balance Sheet Income Statement Balance Sheet Income Statement Income Statement Balance Sheet Balance Sheet Normal Balance Credit Debit Credit Credit Debit Credit Debit Debit Credit Debit Debit Credit Debit Debit Debit Debit Debit Credit Debit Credit Debit Debit Credit Debit (1) Debit Credit Debit Debit Credit Debit Credit Debit B Operating Expense Long-Term Liability Plant Asset C Current Asset Stockholders' Equity Intangible Asset Cost of Goods Sold Balance Sheet Balance Sheet Balance Sheet Income Statement Balance Sheet Income Statement Balance Sheet Income Statement Retained Earnings Statement Balance Sheet Balance...

Words: 56249 - Pages: 225

Free Essay

Test

...Davis 08 11 16 26 34 43 Angular.js, a javascript library and framework created in Google, is a fresh view into building great web applications. You can read a lot of articles on how it separates the concerns of the application, improves testability, and keeps to web app best practices, but I want to highlight a feature that is not shown off as regularly, extending the document object model API. Introduction to AngularJS Dylan Stamat You will learn about some of the core concepts that make AngularJS shine, including binding data to you views, built-in filtering, and some of the interesting architectural decisions behind this MVC framework. We will build a very simple application with local data that show some of these concepts. Diving into Angular Josh Kuhn In this tutorial we’re going to create a barebones Twitter-like application called Pipr. Pipr allows you to create “pips” which are short 100 character or less “pips” that show up on the page in reverse chronological order. You can add tags to your pips, and you can post them with any name you like. In addition, you can delete your pips. AngularJS 101: A Beginner’s Tutorial Karmen Blake This tutorial on AngularJS will guide you through the fundamentals of the framework. You will explore the exciting benefits of using a client-side JavaScript framework to create dynamic and modern web applications. JEDI SENATUS: an italian open source project aims towards the systematic software reuse in organizations ...

Words: 22760 - Pages: 92

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Premium Essay

Pc Security

...Improving Web Application Security Threats and Countermeasures Forewords by Mark Curphey, Joel Scambray, and Erik Olson Improving Web Application Security Threats and Countermeasures patterns & practices J.D. Meier, Microsoft Corporation Alex Mackman, Content Master Srinath Vasireddy, Microsoft Corporation Michael Dunner, Microsoft Corporation Ray Escamilla, Microsoft Corporation Anandha Murukan, Satyam Computer Services Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft, MS-DOS, Windows, Windows NT, Active Directory, BizTalk, IntelliSense, MSDN, Visual Basic, Visual C#, Visual C++, and Visual Studio are either registered trademarks or trademarks of Microsoft...

Words: 83465 - Pages: 334

Free Essay

North Korea War

...Korean War Korean War The Korean War (25 June 1950 - armistice signed 27 July 1953[1] ) was a military conflict between the Republic of Korea, supported by the United Nations, and the Democratic People's Republic of Korea, supported by the People's Republic of China (PRC), with military material aid from the Soviet Union. The war was a result of the physical division of Korea by an agreement of the victorious Allies at the conclusion of the Pacific War at the end of World War II. The Korean peninsula was ruled by Japan from 1910 until the end of World War II. Following the surrender of Japan in 1945, American administrators divided the peninsula along the 38th Parallel, with United States troops occupying the southern part and Soviet troops occupying the northern part.[2] The failure to hold free elections throughout the Korean Peninsula in 1948 deepened the division between the two sides, and the North established a Communist government. The 38th Parallel increasingly became a political border between the two Koreas. Although reunification negotiations continued in the months preceding the war, tension intensified. Cross-border skirmishes and raids at the 38th Parallel persisted. The situation escalated into open warfare when North Korean forces invaded South Korea on 25 June 1950.[3] It was the first significant armed conflict of the Cold War.[4] The United Nations, particularly the United States, came to the aid of South Korea in repelling the invasion. A...

Words: 23177 - Pages: 93

Premium Essay

Mba Syllabus

...SRM UNIVERSITY (Under section 3 of UGC Act, 1956) FACULTY OF MANAGEMENT SCHOOL OF MANAGEMENT MBA FULL TIME CURRICULUM AND SYLLABUS - 2013-14 1 Code MB 13101 MB 13102 MB 13103 MB 13104 MB 13105 MB 13106 SRM University MBA - Revised Curriculum - 2013-14 Semester –I Thinking and Communication Skills (Practical) Accounting for Decision Making Philosophy for Management Economics for Managers Managerial Statistics Managerial Skills (Practical) Semester-II Financial Management Management Information System Marketing Human Resource Management Production And Operation Management Legal Aspects of Business Semester- III Summer Internship (8 weeks)(Practical) Entrepreneurship Strategic Management Business Analytics (Practical) Elective-1 Elective-2 Elective-3 Elective-4 Semester- IV Elective-5 Elective-6 Industrial Elective (Practical) Total Credit L 0 2 3 2 2 0 T 0 4 0 2 4 0 P 4 0 0 0 0 6 C 2 4 3 3 4 3 19 4 3 4 2 4 3 20 2 3 3 2 3 3 3 3 22 3 3 5 11 72 MB 13207 MB 13208 MB 13209 MB 13210 MB 13211 MB 13212 MB 13313 MB 13314 MB 13315 MB 13316 2 2 3 2 3 2 0 2 2 0 2 2 2 2 2 2 0 4 2 2 0 2 2 0 2 2 0 2 2 2 2 2 2 0 0 0 0 0 0 0 4 0 0 4 0 0 0 0 0 0 10 MB 13417 Functional Electives Marketing Finance Systems Human Resource Operations Vertical Electives Pharma Hospitality Enterprise Resource Planning Agriculture Hospital and Health Care Retailing Auto Industry Project Management Media and Communication Banking Financial Service Insurance   2 MB...

Words: 53231 - Pages: 213

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION NOVEMBER 2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 ...

Words: 185166 - Pages: 741

Premium Essay

世界是平的

...The World is Flat Thomas L Friedman Kq p K To Matt and Kay and to Ron Kq p K Contents How the World Became Flat One: While I Was Sleeping / 3 Two: The Ten Forces That Flattened the World / 48 Flattener#l. 11/9/89 Flattener #2. 8/9/95 Flattener #3. Work Flow Software Flattener #4. Open-Sourcing Flattener #5. Outsourcing Flattener #6. Offshoring Flattener #7. Supply-Chaining Flattener #8. Insourcing Flattener #9. In-forming Flattener #10. The Steroids Three: The Triple Convergence / 173 Four: The Great Sorting Out / 201 America and the Flat World Five: America and Free Trade / 225 Six: The Untouchables / 237 Seven: The Quiet Crisis / 250 Eight: This Is Not a Test / 276 Developing Countries and the Flat World Nine: The Virgin of Guadalupe / 309 Companies and the Flat World Geopolitics and the Flat World Eleven: The Unflat World / 371 Twelve: The Dell Theory of Conflict Prevention / 414 Conclusion: Imagination Thirteen: 11/9 Versus 9/11 / 441 Acknowledgments I 471 Index I 475 Kq p K :::::How the World Became Flat ::::: ONE While I Was Sleeping Your Highnesses, as Catholic Christians, and princes who love and promote the holy Christian faith, and are enemies of the doctrine of Mahomet, and of all idolatry and heresy, determined to send me, Christopher Columbus, to the above-mentioned countries of India, to see the said princes, people, and territories, and to learn their disposition and the proper method of converting them to our...

Words: 170179 - Pages: 681

Premium Essay

Mcgraw-Hill - Quality Management Demystified

...QUALITY MANAGEMENT DEMYSTIFIED Demystified Series Advanced Statistics Demystified Algebra Demystified Anatomy Demystified asp.net Demystified Astronomy Demystified Biology Demystified Business Calculus Demystified Business Statistics Demystified C++ Demystified Calculus Demystified Chemistry Demystified College Algebra Demystified Data Structures Demystified Databases Demystified Differential Equations Demystified Digital Electronics Demystified Earth Science Demystified Electricity Demystified Electronics Demystified Environmental Science Demystified Everyday Math Demystified Genetics Demystified Geometry Demystified Home Networking Demystified Investing Demystified Java Demystified JavaScript Demystified Linear Algebra Demystified Macroeconomics Demystified Math Proofs Demystified Math Word Problems Demystified Medical Terminology Demystified Meteorology Demystified Microbiology Demystified OOP Demystified Options Demystified Organic Chemistry Demystified Personal Computing Demystified Pharmacology Demystified Physics Demystified Physiology Demystified Pre-Algebra Demystified Precalculus Demystified Probability Demystified Project Management Demystified Quality Management Demystified Quantum Mechanics Demystified Relativity Demystified Robotics Demystified Six Sigma Demystified sql Demystified Statistics Demystified Trigonometry Demystified uml Demystified Visual Basic 2005 Demystified Visual C# 2005 Demystified xml Demystified QUALITY MANAGEMENT DEMYSTIFIED SID...

Words: 122414 - Pages: 490