nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hierarchical, objectives-based framework for the digital investigations process
|
Beebe, Nicole Lang |
|
2005 |
2 |
2 |
p. 147-167 21 p. |
artikel |
2 |
An overview and analysis of PDA forensic tools
|
Jansen, W. |
|
2005 |
2 |
2 |
p. 120-132 13 p. |
artikel |
3 |
Digital evidence accreditation in the corporate and business environment
|
Barbara, John J. |
|
2005 |
2 |
2 |
p. 137-146 10 p. |
artikel |
4 |
Growing pains
|
Casey, Eoghan |
|
2005 |
2 |
2 |
p. 71-73 3 p. |
artikel |
5 |
News
|
|
|
2005 |
2 |
2 |
p. 74-76 3 p. |
artikel |
6 |
[No title]
|
Nikkel, Bruce |
|
2005 |
2 |
2 |
p. 77- 1 p. |
artikel |
7 |
Risk sensitive digital evidence collection
|
Kenneally, Erin E. |
|
2005 |
2 |
2 |
p. 101-119 19 p. |
artikel |
8 |
The joys of complexity and the deleted file
|
Fellows, Geoff H. |
|
2005 |
2 |
2 |
p. 89-93 5 p. |
artikel |
9 |
Tracking USB storage: Analysis of windows artifacts generated by USB storage devices
|
Carvey, Harlan |
|
2005 |
2 |
2 |
p. 94-100 7 p. |
artikel |
10 |
Trojan defence: A forensic view part II
|
Ghavalas, Byrne |
|
2005 |
2 |
2 |
p. 133-136 4 p. |
artikel |
11 |
Volume analysis of disk spanning logical volumes
|
Carrier, Brian D. |
|
2005 |
2 |
2 |
p. 78-88 11 p. |
artikel |