no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Building FBI computer forensics capacity: one lab at a time
|
Schmitknecht, Douglas A. |
|
2004 |
1 |
3 |
p. 177-182 6 p. |
article |
2 |
Deploying forensic tools via PXE
|
O'Connor, Owen |
|
2004 |
1 |
3 |
p. 173-176 4 p. |
article |
3 |
Events
|
|
|
2004 |
1 |
3 |
p. 213- 1 p. |
article |
4 |
Forensic analysis of Windows hosts using UNIX-based tools
|
Altheide, Cory |
|
2004 |
1 |
3 |
p. 197-212 16 p. |
article |
5 |
Formalization of computer input and output: the Hadley model
|
Gerber, Matthew |
|
2004 |
1 |
3 |
p. 214-224 11 p. |
article |
6 |
News
|
Hilley, Sarah |
|
2004 |
1 |
3 |
p. 162-164 3 p. |
article |
7 |
[No title]
|
Watson, D. |
|
2004 |
1 |
3 |
p. 195-196 2 p. |
article |
8 |
Reporting security breaches – a risk to be avoided or responsibility to be embraced?
|
Casey, Eoghan |
|
2004 |
1 |
3 |
p. 159-161 3 p. |
article |
9 |
Training and accreditation – who are the experts?
|
Jones, Nigel |
|
2004 |
1 |
3 |
p. 189-194 6 p. |
article |
10 |
Unification of relative time frames for digital forensics
|
Stevens, Malcolm W. |
|
2004 |
1 |
3 |
p. 225-239 15 p. |
article |
11 |
What evidence is left after disk cleaners?
|
Jones, Andy |
|
2004 |
1 |
3 |
p. 183-188 6 p. |
article |
12 |
Xbox security issues and forensic recovery methodology (utilising Linux)
|
Vaughan, Chris |
|
2004 |
1 |
3 |
p. 165-172 8 p. |
article |