nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Ambiguities in US law for investigators
|
Howell, Beryl A. |
|
2004 |
1 |
2 |
p. 106-111 6 p. |
artikel |
2 |
Digital logs—proof matters
|
Kenneally, Erin E. |
|
2004 |
1 |
2 |
p. 94-101 8 p. |
artikel |
3 |
Events
|
Hilley, S. |
|
2004 |
1 |
2 |
p. 129- 1 p. |
artikel |
4 |
File classification using byte sub-stream kernels
|
de Vel, Olivier |
|
2004 |
1 |
2 |
p. 150-157 8 p. |
artikel |
5 |
Finite state machine approach to digital event reconstruction
|
Gladyshev, Pavel |
|
2004 |
1 |
2 |
p. 130-149 20 p. |
artikel |
6 |
Future issues in forensic computing and an introduction to ENSFI
|
Freyssinet, Eric |
|
2004 |
1 |
2 |
p. 112-113 2 p. |
artikel |
7 |
Investigating around mainframes and other high-end systems: the revenge of big iron
|
Pemble, Matthew |
|
2004 |
1 |
2 |
p. 90-93 4 p. |
artikel |
8 |
News announcements
|
Hilley, Sarah |
|
2004 |
1 |
2 |
p. 86-88 3 p. |
artikel |
9 |
Penetrating encrypted evidence
|
Wolfe, Hank |
|
2004 |
1 |
2 |
p. 102-105 4 p. |
artikel |
10 |
The need for objective case review
|
Casey, Eoghan |
|
2004 |
1 |
2 |
p. 83-85 3 p. |
artikel |
11 |
Tool review—WinHex
|
Casey, Eoghan |
|
2004 |
1 |
2 |
p. 114-128 15 p. |
artikel |
12 |
UK Computer Misuse Act—the Trojan virus defence
|
George, Esther |
|
2004 |
1 |
2 |
p. 89- 1 p. |
artikel |