Computer forensics: Are you qualified?

被引:0
|
作者
机构
来源
Comput. Fraud Secur. | 2008年 / 12卷 / 18-20期
关键词
D O I
10.1016/S1361-3723(08)70179-9
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Tools and methods of computer forensics
    Strumenti e metodi della computer forensics
    Bassetti, Nanni, 1600, Associazione Italiana per l'Informatica e il Calcolo Automatico, Piazzale Rodolfo Morandi, 2, Milano, 20121, Italy (13):
  • [22] Offensive and defensive computer forensics
    Wolfe, HB
    CHALLENGES OF INFORMATION TECHNOLOGY MANAGEMENT IN THE 21ST CENTURY, 2000, : 805 - 807
  • [23] Teaching a Computer Forensics Course
    Ali, Farha
    ACMSE 2021: PROCEEDINGS OF THE 2021 ACM SOUTHEAST CONFERENCE, 2021, : 33 - 39
  • [24] New perspectives on computer forensics
    Sinar, H
    FORENSIC SCIENCE INTERNATIONAL, 2003, 136 : 200 - 200
  • [25] Automated abduction for computer forensics
    Doncescu, Andrei
    Inoue, Katsumi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 493 - 499
  • [26] eDiscovery versus Computer Forensics
    Matthews, David R.
    INFORMATION SECURITY JOURNAL, 2010, 19 (03): : 118 - 123
  • [27] Computer forensics chain of custody
    Enrique Arellano, Luis
    Mario Castaneda, Carlos
    CUADERNO ACTIVA, 2012, (03): : 67 - 81
  • [28] Anti-computer forensics
    Hausknecht, K.
    Gruicic, S.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 1233 - 1240
  • [29] Research and Review on Computer Forensics
    Guo Hong
    Jin Bo
    Huang Daoli
    CHINA COMMUNICATIONS, 2010, 7 (06) : 37 - 43
  • [30] Computer Forensics: Principles and Practices
    Liu, Jigang
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (03) : 57 - 59