nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An examination into Trillian basic 3.x contact identification
|
Dickson, Mike |
|
2007 |
4 |
1 |
p. 36-45 10 p. |
artikel |
2 |
Anti-forensics with a small army of exploits
|
Hilley, S. |
|
2007 |
4 |
1 |
p. 13-15 3 p. |
artikel |
3 |
Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags
|
Turner, Philip |
|
2007 |
4 |
1 |
p. 30-35 6 p. |
artikel |
4 |
Digital evidence maps – A sign of the times
|
Casey, Eoghan |
|
2007 |
4 |
1 |
p. 1-2 2 p. |
artikel |
5 |
Events Calendar
|
|
|
2007 |
4 |
1 |
p. I- 1 p. |
artikel |
6 |
FriendlyRoboCopy: A GUI to RoboCopy for computer forensic investigators
|
LaVelle, Claire |
|
2007 |
4 |
1 |
p. 16-23 8 p. |
artikel |
7 |
News
|
|
|
2007 |
4 |
1 |
p. 3-6 4 p. |
artikel |
8 |
[No title]
|
Wolfe, H. |
|
2007 |
4 |
1 |
p. 46- 1 p. |
artikel |
9 |
[No title]
|
Wolfe, H. |
|
2007 |
4 |
1 |
p. 46-47 2 p. |
artikel |
10 |
Tackling the U3 trend with computer forensics
|
Spruill, Andy |
|
2007 |
4 |
1 |
p. 7-12 6 p. |
artikel |
11 |
Using every part of the buffalo in Windows memory analysis
|
Kornblum, Jesse D. |
|
2007 |
4 |
1 |
p. 24-29 6 p. |
artikel |