메뉴 건너뛰기




Volumn 2006, Issue 6, 2006, Pages 14-16

Managing corporate computer forensics

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; INFORMATION TECHNOLOGY; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 33745505202     PISSN: 13613723     EISSN: None     Source Type: Trade Journal    
DOI: 10.1016/S1361-3723(06)70368-2     Document Type: Article
Times cited : (13)

References (10)
  • 1
    • 33745512583 scopus 로고    scopus 로고
    • ACPO (2005) Good practice guide to computer based evidence, Version 3, The Association of Chief Police Officers of England, Wales and N. Ireland, http://www.acpo.police.uk
  • 2
    • 23844493846 scopus 로고    scopus 로고
    • The corporation: the non-policed state
    • Hilley S. The corporation: the non-policed state. Infosecurity Today 1 6 (2004) 36-37
    • (2004) Infosecurity Today , vol.1 , Issue.6 , pp. 36-37
    • Hilley, S.1
  • 3
    • 32544453278 scopus 로고    scopus 로고
    • The role of technology in computer forensic investigations
    • Janes S. The role of technology in computer forensic investigations. Information Security Technical Report 5 2 (2000) 43-50
    • (2000) Information Security Technical Report , vol.5 , Issue.2 , pp. 43-50
    • Janes, S.1
  • 4
    • 33745491603 scopus 로고    scopus 로고
    • Strengthening the collaboration between the investigator and the information systems manager through methodical computer traces management
    • Lathoud B., and Ghernaouti-Helie S. Strengthening the collaboration between the investigator and the information systems manager through methodical computer traces management. Forensic Science International 136 1001 (2003) 199-200
    • (2003) Forensic Science International , vol.136 , Issue.1001 , pp. 199-200
    • Lathoud, B.1    Ghernaouti-Helie, S.2
  • 5
    • 33745496284 scopus 로고    scopus 로고
    • Digital evidence on magnetic recordings
    • Leimkuller H. Digital evidence on magnetic recordings. Forensic Science Inter-national 136 1001 (2003) 200-201
    • (2003) Forensic Science Inter-national , vol.136 , Issue.1001 , pp. 200-201
    • Leimkuller, H.1
  • 6
    • 33745494622 scopus 로고    scopus 로고
    • Criminalistic examination of electronic documents containing hidden information layers
    • Liber A. Criminalistic examination of electronic documents containing hidden information layers. Forensic Science Inter-national 136 1001 (2003) 196-197
    • (2003) Forensic Science Inter-national , vol.136 , Issue.1001 , pp. 196-197
    • Liber, A.1
  • 7
    • 0036856627 scopus 로고    scopus 로고
    • Options in computer forensic tools
    • Morris R. Options in computer forensic tools. Computer Fraud & Security 2002 11 (2002) 8-11
    • (2002) Computer Fraud & Security , vol.2002 , Issue.11 , pp. 8-11
    • Morris, R.1
  • 8
    • 33745501135 scopus 로고    scopus 로고
    • Forensic computing helps firms track high-tech fraud
    • Murray S. Forensic computing helps firms track high-tech fraud. Computers & Security 17 3 (1998) 223-224
    • (1998) Computers & Security , vol.17 , Issue.3 , pp. 223-224
    • Murray, S.1
  • 10
    • 84979802564 scopus 로고    scopus 로고
    • Foundations of computer forensics: A technology for the fight against computer crime
    • Wang Y., Cannady J., and Rosenbluth J. Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Report 21 (2005) 119-127
    • (2005) Computer Law & Security Report , vol.21 , pp. 119-127
    • Wang, Y.1    Cannady, J.2    Rosenbluth, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.