nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A tribute to Gordon Stevenson
|
|
|
2005 |
2 |
4 |
p. 235-236 2 p. |
artikel |
2 |
Case study: A failure in success' clothing
|
Kenneally, Erin E. |
|
2005 |
2 |
4 |
p. 247-253 7 p. |
artikel |
3 |
Case study: Network intrusion investigation – lessons in forensic preparation
|
Casey, Eoghan |
|
2005 |
2 |
4 |
p. 254-260 7 p. |
artikel |
4 |
Criminal profiling and insider cyber crime
|
Nykodym, Nick |
|
2005 |
2 |
4 |
p. 261-267 7 p. |
artikel |
5 |
Digital arms race – The need for speed
|
Casey, Eoghan |
|
2005 |
2 |
4 |
p. 229-230 2 p. |
artikel |
6 |
Examining the state of preparedness of Information Technology management in New Zealand for events that may require forensic analysis
|
Quinn, Spike |
|
2005 |
2 |
4 |
p. 276-280 5 p. |
artikel |
7 |
Forensics - cred or crud?
|
|
|
2005 |
2 |
4 |
p. 237-238 2 p. |
artikel |
8 |
Methods of discovery and exploitation of Host Protected Areas on IDE storage devices that conform to ATAPI-4
|
Bedford, Mark |
|
2005 |
2 |
4 |
p. 268-275 8 p. |
artikel |
9 |
NEWS
|
|
|
2005 |
2 |
4 |
p. 233-234 2 p. |
artikel |
10 |
News
|
|
|
2005 |
2 |
4 |
p. 231-233 3 p. |
artikel |
11 |
No place to hide
|
Bradbury, Danny |
|
2005 |
2 |
4 |
p. 244-246 3 p. |
artikel |
12 |
The unique challenges of collecting corporate evidence
|
Kent, Jim |
|
2005 |
2 |
4 |
p. 239-243 5 p. |
artikel |