-
1
-
-
49049115219
-
-
Accessed 2007
-
AccessData. FTK, Accessed 2007. http://www.accessdata.com/common/ pagedetail.aspx?PageCode=ftk2test.
-
-
-
-
2
-
-
36448964550
-
-
Boston: Springer, Advances in Digital Forensics iii edition
-
K. K. Arthur, M. S. Olivier, and H. S. Venter. Applying the Biba Integrity Model To Evidence Management, volume 242 of IFIP International Federation for Information Processing. Boston: Springer, Advances in Digital Forensics iii edition, 2007. pp. 317-327.
-
(2007)
Applying the Biba Integrity Model To Evidence Management, volume 242 of IFIP International Federation for Information Processing
, pp. 317-327
-
-
Arthur, K.K.1
Olivier, M.S.2
Venter, H.S.3
-
3
-
-
84979802546
-
Cyber Crime-A new breed of criminal? Computer Law & Security Report
-
222-227, May
-
K. Burden, C. Palmer, B. Lyde, and Gilbert. Cyber Crime-A new breed of criminal? Computer Law & Security Report, 19(3):222-227, May 2003.
-
(2003)
, vol.19
, Issue.3
-
-
Burden, K.1
Palmer, C.2
Lyde, B.3
Gilbert4
-
5
-
-
11144285997
-
Proving the Integrity of Digital Evidence with Time
-
Spring
-
C. Hosmer. Proving the Integrity of Digital Evidence with Time. International Journal of Digital Evidence, 1(1), Spring 2002.
-
(2002)
International Journal of Digital Evidence
, vol.1
, Issue.1
-
-
Hosmer, C.1
-
8
-
-
0004011439
-
Introduction to Languages and the Theory of Computation
-
McGraw-Hill International Editions, Second edition
-
J. C. Martin. Introduction to Languages and the Theory of Computation. Programming Languages Series. McGraw-Hill International Editions, Second edition, 1997.
-
(1997)
Programming Languages Series
-
-
Martin, J.C.1
-
9
-
-
84880395007
-
-
Accessed 2007
-
National Institute of Standards and Technology. National Software Reference Library, Accessed 2007. http://www.nsrl.nist.gov/.
-
National Software Reference Library
-
-
-
10
-
-
49049106206
-
-
T. Pathways. ProDiscover Computer Forensics, Accessed 2007. http://www.techpathways.com/prodiscoverdft.htm.
-
T. Pathways. ProDiscover Computer Forensics, Accessed 2007. http://www.techpathways.com/prodiscoverdft.htm.
-
-
-
-
12
-
-
0004292408
-
-
DARPA Internet Program Protocol Specification, September
-
J. Postel. Internet Protocol: DARPA Internet Program Protocol Specification, September 1981. http://www.rfc-editor.org/rfc/rfc791.txt.
-
(1981)
Internet Protocol
-
-
Postel, J.1
-
15
-
-
49049092662
-
-
G. Software. Encase Forensic, Accessed 2007. http://www.guidancesoftware. com/products/ef_index.aspx.
-
G. Software. Encase Forensic, Accessed 2007. http://www.guidancesoftware. com/products/ef_index.aspx.
-
-
-
-
17
-
-
84892104868
-
-
Accessed 2007
-
Wikipedia. Finite State Machine, Accessed 2007. http://en.wikipedia.org/ wiki/Finite_state_machine.
-
Finite State Machine
-
-
-
18
-
-
49049114611
-
-
Accessed 2007
-
Wikipedia. Gary McKinnon, Accessed 2007. http://en.wikipedia.org/wiki/ Gary_McKinnon.
-
Gary McKinnon
-
-
-
19
-
-
0037223962
-
The circumstances of seizure
-
February
-
H. B. Wolfe. The circumstances of seizure. Computers & Security, 22(2):96-98, February 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.2
, pp. 96-98
-
-
Wolfe, H.B.1
-
20
-
-
0037287457
-
Computer forensics
-
January
-
H. B. Wolfe. Computer forensics. Computers & Security, 22(1):26-28, January 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 26-28
-
-
Wolfe, H.B.1
-
21
-
-
0037530619
-
Evidence Analysis
-
May
-
H. B. Wolfe. Evidence Analysis. Computers & Security, 22(4):289-291, May 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 289-291
-
-
Wolfe, H.B.1
|