Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 Building FBI computer forensics capacity: one lab at a time Schmitknecht, Douglas A.
2004
1 3 p. 177-182
6 p.
article
2 Deploying forensic tools via PXE O'Connor, Owen
2004
1 3 p. 173-176
4 p.
article
3 Events 2004
1 3 p. 213-
1 p.
article
4 Forensic analysis of Windows hosts using UNIX-based tools Altheide, Cory
2004
1 3 p. 197-212
16 p.
article
5 Formalization of computer input and output: the Hadley model Gerber, Matthew
2004
1 3 p. 214-224
11 p.
article
6 News Hilley, Sarah
2004
1 3 p. 162-164
3 p.
article
7 [No title] Watson, D.
2004
1 3 p. 195-196
2 p.
article
8 Reporting security breaches – a risk to be avoided or responsibility to be embraced? Casey, Eoghan
2004
1 3 p. 159-161
3 p.
article
9 Training and accreditation – who are the experts? Jones, Nigel
2004
1 3 p. 189-194
6 p.
article
10 Unification of relative time frames for digital forensics Stevens, Malcolm W.
2004
1 3 p. 225-239
15 p.
article
11 What evidence is left after disk cleaners? Jones, Andy
2004
1 3 p. 183-188
6 p.
article
12 Xbox security issues and forensic recovery methodology (utilising Linux) Vaughan, Chris
2004
1 3 p. 165-172
8 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands