nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Building FBI computer forensics capacity: one lab at a time
|
Schmitknecht, Douglas A. |
|
2004 |
1 |
3 |
p. 177-182 6 p. |
artikel |
2 |
Deploying forensic tools via PXE
|
O'Connor, Owen |
|
2004 |
1 |
3 |
p. 173-176 4 p. |
artikel |
3 |
Events
|
|
|
2004 |
1 |
3 |
p. 213- 1 p. |
artikel |
4 |
Forensic analysis of Windows hosts using UNIX-based tools
|
Altheide, Cory |
|
2004 |
1 |
3 |
p. 197-212 16 p. |
artikel |
5 |
Formalization of computer input and output: the Hadley model
|
Gerber, Matthew |
|
2004 |
1 |
3 |
p. 214-224 11 p. |
artikel |
6 |
News
|
Hilley, Sarah |
|
2004 |
1 |
3 |
p. 162-164 3 p. |
artikel |
7 |
[No title]
|
Watson, D. |
|
2004 |
1 |
3 |
p. 195-196 2 p. |
artikel |
8 |
Reporting security breaches – a risk to be avoided or responsibility to be embraced?
|
Casey, Eoghan |
|
2004 |
1 |
3 |
p. 159-161 3 p. |
artikel |
9 |
Training and accreditation – who are the experts?
|
Jones, Nigel |
|
2004 |
1 |
3 |
p. 189-194 6 p. |
artikel |
10 |
Unification of relative time frames for digital forensics
|
Stevens, Malcolm W. |
|
2004 |
1 |
3 |
p. 225-239 15 p. |
artikel |
11 |
What evidence is left after disk cleaners?
|
Jones, Andy |
|
2004 |
1 |
3 |
p. 183-188 6 p. |
artikel |
12 |
Xbox security issues and forensic recovery methodology (utilising Linux)
|
Vaughan, Chris |
|
2004 |
1 |
3 |
p. 165-172 8 p. |
artikel |