nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis of CCTV digital video recorder hard disk storage system
|
Poole, N.R. |
|
2009 |
5 |
3-4 |
p. 85-92 8 p. |
artikel |
2 |
Data concealment and detection in Microsoft Office 2007 files
|
Park, Bora |
|
2009 |
5 |
3-4 |
p. 104-114 11 p. |
artikel |
3 |
“Dawn raids” bring a new form in incident response
|
Casey, Eoghan |
|
2009 |
5 |
3-4 |
p. 73-74 2 p. |
artikel |
4 |
Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records
|
Pereira, Murilo Tito |
|
2009 |
5 |
3-4 |
p. 93-103 11 p. |
artikel |
5 |
Implementing BitLocker Drive Encryption for forensic analysis
|
Kornblum, Jesse D. |
|
2009 |
5 |
3-4 |
p. 75-84 10 p. |
artikel |
6 |
Meetings between experts: A route to simpler, fairer trials?
|
Sommer, Peter |
|
2009 |
5 |
3-4 |
p. 146-152 7 p. |
artikel |
7 |
[No title]
|
Forster, Peter F.R. |
|
2009 |
5 |
3-4 |
p. 153-154 2 p. |
artikel |
8 |
On metadata context in Database Forensics
|
Olivier, Martin S. |
|
2009 |
5 |
3-4 |
p. 115-123 9 p. |
artikel |
9 |
Prelim i - Editorial Board
|
|
|
2009 |
5 |
3-4 |
p. i- 1 p. |
artikel |
10 |
Source attribution for network address translated forensic captures
|
Cohen, M.I. |
|
2009 |
5 |
3-4 |
p. 138-145 8 p. |
artikel |
11 |
Towards an integrated e-mail forensic analysis framework
|
Hadjidj, Rachid |
|
2009 |
5 |
3-4 |
p. 124-137 14 p. |
artikel |