Joshua Sawyer

Learn More
In today's world of fast-paced communications, the need to access data while physically away from the workplace or home has greatly increased. This has given rise to the practice of mobile computing, which is often taken for granted by many users. While mobile computing is often seen as an efficient, alternative way of completing tasks, it can also be used(More)
In presenting the dangers of magnetic data recovery, this paper gives the reader a descriptive, yet active view. The methods themselves are described, as well as possible avenues of action that can be used to prevent and mitigate this type of security breach via real-life examples from the field. The primary target of this paper is the business / corporate(More)
  • 1