nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Generalizing sources of live network evidence
|
Nikkel, Bruce J. |
|
2005 |
2 |
3 |
p. 193-200 8 p. |
artikel |
2 |
Investigating security breaches
|
Casey, Eoghan |
|
2005 |
2 |
3 |
p. 169-170 2 p. |
artikel |
3 |
Methodologies for the use of VMware to boot cloned/mounted subject hard disk images
|
Penhallurick, Michael A. |
|
2005 |
2 |
3 |
p. 209-222 14 p. |
artikel |
4 |
Pressure mounts on US Senate to pass cybercrime treaty
|
|
|
2005 |
2 |
3 |
p. 171-174 4 p. |
artikel |
5 |
Requiring protocols in computer search warrants
|
Brenner, Susan W. |
|
2005 |
2 |
3 |
p. 180-188 9 p. |
artikel |
6 |
The future implications of computer forensics on VOIP
|
|
|
2005 |
2 |
3 |
p. 206-208 3 p. |
artikel |
7 |
The Windows Registry as a forensic resource
|
Carvey, Harlan |
|
2005 |
2 |
3 |
p. 201-205 5 p. |
artikel |
8 |
To image a Macintosh
|
McDonald, Keith |
|
2005 |
2 |
3 |
p. 175-179 5 p. |
artikel |
9 |
Trusted computing and forensic investigations
|
Mason, Stephen |
|
2005 |
2 |
3 |
p. 189-192 4 p. |
artikel |
10 |
Unification of digital evidence from disparate sources (Digital Evidence Bags)
|
Turner, Philip |
|
2005 |
2 |
3 |
p. 223-228 6 p. |
artikel |