nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new blind method for detecting novel steganography
|
McBride, Brent T. |
|
2005 |
2 |
1 |
p. 50-70 21 p. |
artikel |
2 |
Digital provenance – interpretation, verification and corroboration
|
Turner, Philip |
|
2005 |
2 |
1 |
p. 45-49 5 p. |
artikel |
3 |
Forensic acquisition and analysis of magnetic tapes
|
Nikkel, Bruce J. |
|
2005 |
2 |
1 |
p. 8-18 11 p. |
artikel |
4 |
Malware analysis for windows administrators
|
Carvey, Harlan |
|
2005 |
2 |
1 |
p. 19-22 4 p. |
artikel |
5 |
MD5 collisions and the impact on computer forensics
|
Thompson, Eric |
|
2005 |
2 |
1 |
p. 36-40 5 p. |
artikel |
6 |
News
|
|
|
2005 |
2 |
1 |
p. 4-7 4 p. |
artikel |
7 |
[No title]
|
Reid, Adrian |
|
2005 |
2 |
1 |
p. 3- 1 p. |
artikel |
8 |
Origins and progress
|
Casey, Eoghan |
|
2005 |
2 |
1 |
p. 1-2 2 p. |
artikel |
9 |
The future of forensic computing
|
Sheldon, Andrew |
|
2005 |
2 |
1 |
p. 31-35 5 p. |
artikel |
10 |
The Internet is the computer: The role of forensics in bridging the digital and physical divide
|
Kenneally, Erin E. |
|
2005 |
2 |
1 |
p. 41-44 4 p. |
artikel |
11 |
Trojan defence: A forensic view
|
Haagman, Dan |
|
2005 |
2 |
1 |
p. 23-30 8 p. |
artikel |