24.3.1 Functioning principles of Information wiping methods ........................................................................... 189
24.3.2 Information wiping methods used by Acronis .......................................................................................... 190
25 Startup Parameters ............................................................................................................ 191
25.1 Description .............................................................................................................................191
26 Index ................................................................................................................................. 193
Comentarios a estos manuales