-
1
-
-
0346252711
-
Computer forensics and its future trend
-
Chinese source
-
Wang L, Qian HL. Computer forensics and its future trend. Journal of Software, 2003, 14(9): 1635-1644 (in Chinese with English with abstract). http://www.jos.org.cn/1000-9825/14/1635.htm
-
(2003)
Journal of Software
, vol.14
, Issue.9
, pp. 1635-1644
-
-
Wang, L.1
Qian, H.L.2
-
2
-
-
14244265574
-
-
Beijing: Law Press China, Chinese source
-
Zhang P. Internet Law Review. Vol.3, Beijing: Law Press China, 2003 (in Chinese).
-
(2003)
Internet Law Review
-
-
Zhang, P.1
-
4
-
-
15744396213
-
-
Teaching Material Writing and Editing Council in Ministry of Public Security. Beijing: The Mass Press, Chinese source
-
Teaching Material Writing and Editing Council in Ministry of Public Security. Security Supervise on Network Information. Beijing: The Mass Press, 2000 (in Chinese).
-
(2000)
Security Supervise on Network Information
-
-
-
5
-
-
15744382856
-
Electronic evidences in e-business and its law status
-
Yang CG. Electronic evidences in e-business and its law status. 2001. http://cooltoy.yesky.com/20010118/155824_1.shtml
-
(2001)
-
-
Yang, C.G.1
-
7
-
-
15744375705
-
Computer evidence processing: The important first step-safe seizure of the computer
-
Anderson MR. Computer evidence processing: The important first step-safe seizure of the computer. http://www.forensics-intl.com
-
-
-
Anderson, M.R.1
-
9
-
-
84898327114
-
Electronic fingerprints--Computer evidence comes of age
-
Anderson MR. Electronic fingerprints--Computer evidence comes of age. http://www.forensics-intl.com
-
-
-
Anderson, M.R.1
-
10
-
-
15744367256
-
New focus on the subject of computer security - The subject of computer forensics
-
He M. New focus on the subject of computer security-The subject of computer forensics. System Security, 2002, 7: 42-43.
-
(2002)
System Security
, vol.7
, pp. 42-43
-
-
He, M.1
-
13
-
-
15744364779
-
Research on technology of computer forensic
-
Liang JH, Jiang JC, Dai FY, Qiang SH. Research on technology of computer forensic. Computer Engineering, 2002, 28(8): 12-14.
-
(2002)
Computer Engineering
, vol.28
, Issue.8
, pp. 12-14
-
-
Liang, J.H.1
Jiang, J.C.2
Dai, F.Y.3
Qiang, S.H.4
-
14
-
-
15744383084
-
Internet security - Firewalls and encryption: The cyber cop's perspective
-
Anderson MR. Internet security-Firewalls and encryption: the cyber cop's perspective. http://www.forensics-intl.com/art1.html
-
-
-
Anderson, M.R.1
-
15
-
-
15744385353
-
Study and design of computer forensics
-
Qian GQ, Yang ZM, Xu RS. Study and design of computer forensics. Computer Engineering, 2002, 28(6): 56-58.
-
(2002)
Computer Engineering
, vol.28
, Issue.6
, pp. 56-58
-
-
Qian, G.Q.1
Yang, Z.M.2
Xu, R.S.3
-
16
-
-
0345914401
-
Armouring the ELF: Binary encryption on the UNIX platform
-
Phrack #58 article5
-
Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5. 2001. http://www.phrack.org
-
(2001)
-
-
-
18
-
-
15744402616
-
A summary of network intrusion traceback
-
Chinese source
-
Zhang J, Gong J. A summary of network intrusion traceback. Computer Science, 2003, 30(10): 155-166 (in Chinese with English abstract).
-
(2003)
Computer Science
, vol.30
, Issue.10
, pp. 155-166
-
-
Zhang, J.1
Gong, J.2
-
19
-
-
0036870198
-
Network forensics analysis
-
Corey V, Peterman C, Shearins S, Greenberg MS, Van Bokkelen J. Network forensics analysis. IEEE Internet Computing, 2002 6(6): 60-66.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 60-66
-
-
Corey, V.1
Peterman, C.2
Shearins, S.3
Greenberg, M.S.4
van Bokkelen, J.5
-
20
-
-
15744381811
-
Incident response tools for Unix, part one: System tools
-
Sorenson H. Incident response tools for Unix, part one: System tools. 2003. http://www.securityfocus.com/infocus/1679
-
(2003)
-
-
Sorenson, H.1
-
21
-
-
0038476545
-
A survey on software watermarking
-
Chinese source
-
Zhang LH, Yang YX, Niu XY, Niu SZ. A survey on software watermarking. Journal of Software, 2003, 14(2): 268-277 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/268.htm
-
(2003)
Journal of Software
, vol.14
, Issue.2
, pp. 268-277
-
-
Zhang, L.H.1
Yang, Y.X.2
Niu, X.Y.3
Niu, S.Z.4
|