Works matching Computer forensics
Results: 527
Identifying Metadata Elements in Computer Forensics in Malaysia.
- Published in:
- International Journal of Information & Knowledge Management (22318836), 2021, v. 11, n. 1, p. 78
- By:
- Publication type:
- Article
Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics.
- Published in:
- International Journal of Cloud Applications & Computing, 2011, v. 1, n. 3, p. 22, doi. 10.4018/ijcac.2011070103
- By:
- Publication type:
- Article
Adli Bilişim Eğitiminin Gereksinimi ve Genel Olarak Değerlendirilmesi.
- Published in:
- International Journal of InformaticsTechnologies, 2016, v. 9, n. 2, p. 137, doi. 10.17671/btd.31631
- By:
- Publication type:
- Article
Adli Bilişim İncelemelerinde Birebir Kopya Alınmasının (İmaj Almak) Önemi.
- Published in:
- International Journal of InformaticsTechnologies, 2012, v. 5, n. 3, p. 29
- By:
- Publication type:
- Article
Systematic Review: Anti-Forensic Computer Techniques.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 12, p. 5302, doi. 10.3390/app14125302
- By:
- Publication type:
- Article
Adli Bilişim ve Dijital Delillerin Windows İşletim Sistemi Üzerinde İncelenmesi.
- Published in:
- Journal of Polytechnic, 2021, v. 24, n. 3, p. 1187, doi. 10.2339/politeknik.860163
- By:
- Publication type:
- Article
Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies.
- Published in:
- International Journal of Information & Knowledge Management (22318836), 2024, v. 14, n. 2, p. 127, doi. 10.24191/jikm.v14i2.4474
- By:
- Publication type:
- Article
EFFECTIVENESS OF THE METHOD OF FORENSIC COMPUTER SIMULATION OF OFFENCES IN THE CONTEXT OF MILITARY OPERATIONS.
- Published in:
- Lex Humana, 2024, v. 16, n. 1, p. 156
- By:
- Publication type:
- Article
COMPUTER FORENSICS: AN OVERVIEW.
- Published in:
- i-Manager's Journal on Software Engineering, 2016, v. 10, n. 4, p. 1, doi. 10.26634/jse.10.4.6056
- By:
- Publication type:
- Article
Computer Forensics - Past, Present and Future.
- Published in:
- Journal of Information Science & Technology, 2008, v. 5, n. 3, p. 43
- By:
- Publication type:
- Article
COMPUTER FORENSICS FRAUD INVESTIGATIONS.
- Published in:
- Journal of Forensic Studies in Accounting & Business, 2009, v. 1, n. 1, p. 69
- By:
- Publication type:
- Article
Escaping the Computer-Forensics Certification Maze: A Survey of Professional Certifications.
- Published in:
- Communications of the Association for Information Systems, 2008, v. 23, p. 547, doi. 10.17705/1CAIS.02330
- By:
- Publication type:
- Article
CRIME INVESTIGATION: A COURSE IN COMPUTER FORENSICS.
- Published in:
- Communications of the Association for Information Systems, 2006, v. 18, p. 2, doi. 10.17705/1CAIS.01810
- By:
- Publication type:
- Article
Importance of Operating Systems Type in Computer Forensics.
- Published in:
- International Journal of Information Security & Cybercrime, 2015, v. 4, n. 2, p. 9, doi. 10.19107/IJISC.2015.02.01
- By:
- Publication type:
- Article
COMPUTER FORENSICS: THE MODERN CRIME FIGHTING TOOL.
- Published in:
- Journal of Computer Information Systems, 2005, v. 46, n. 2, p. 115
- By:
- Publication type:
- Article
Demonstrating Operating System Principles via Computer Forensics Exercises.
- Published in:
- Journal of Information Systems Education, 2010, v. 21, n. 2, p. 195
- By:
- Publication type:
- Article
AN EXAMINATION OF COMPUTER FORENSICS AND RELATED CERTIFICATIONS IN THE ACCOUNTING CURRICULUM.
- Published in:
- Journal of Digital Forensics, Security & Law, 2019, v. 14, n. 1, p. 1
- By:
- Publication type:
- Article
COMPUTER FORENSIC PROJECTS FOR ACCOUNTANTS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 3, p. 7
- By:
- Publication type:
- Article
UNDERSTANDING COMPUTER FORENSICS REQUIREMENTS IN CHINA VIA THE "PANDA BURNING INCENSE" VIRUS CASE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 51
- By:
- Publication type:
- Article
THE DEVELOPMENT OF COMPUTER FORENSIC LEGAL SYSTEM IN CHINA.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 9
- By:
- Publication type:
- Article
DNS in Computer Forensics.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 11
- By:
- Publication type:
- Article
Computer Forensic Functions Testing: Media Preparation, Write Protection and Verification.
- Published in:
- Journal of Digital Forensics, Security & Law, 2010, v. 5, n. 2, p. 5
- By:
- Publication type:
- Article
Protocolo de informática forense ante ciberincidentes en telemedicina para preservar información como primera respuesta.
- Published in:
- Revista Científica General José María Córdova, 2021, v. 19, n. 33, p. 181, doi. 10.21830/19006586.726
- By:
- Publication type:
- Article
Computer Forensics: Examining the Effectiveness of File Deletion.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 3, p. 33
- By:
- Publication type:
- Article
Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 16, p. 10097, doi. 10.1007/s11042-015-2798-8
- By:
- Publication type:
- Article
Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 11, p. 1229, doi. 10.3390/electronics10111229
- By:
- Publication type:
- Article
ELECTRONIC EVIDENCE AND COMPUTER FORENSICS.
- Published in:
- Communications of the Association for Information Systems, 2003, v. 12, p. 457, doi. 10.17705/1CAIS.01227
- By:
- Publication type:
- Article
eDiscovery versus Computer Forensics.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 3, p. 118, doi. 10.1080/19393550903074135
- By:
- Publication type:
- Article
ADLİ BİLISİM, ELEKTRONİK DELİLLER VE BİLGİSAYARLARDA ARAMA VE EL KOYMA TEDBİRİNİN HUKUKİ REJİMİ (CMK M. 134).
- Published in:
- Ankara Barosu Dergileri, 2015, v. 73, n. 1, p. 41
- By:
- Publication type:
- Article
La informática forense, un camino para potenciar el control interno.
- Published in:
- Dilemas Contemporáneos: Educación, Política y Valores, 2019, v. 7, p. 1
- By:
- Publication type:
- Article
In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes.
- Published in:
- Journal of Forensic Sciences, 2016, v. 61, p. S110, doi. 10.1111/1556-4029.12979
- By:
- Publication type:
- Article
The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations.
- Published in:
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 3, p. 159, doi. 10.1080/19393555.2011.654317
- By:
- Publication type:
- Article
Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners.
- Published in:
- Journal of Digital Forensics, Security & Law, 2010, v. 5, n. 1, p. 5
- By:
- Publication type:
- Article
Computer Forensics World.
- Published in:
- IT Professional, 2005, v. 7, n. 4, p. 57
- Publication type:
- Article
The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town.
- Published in:
- Issues in Informing Science & Information Technology, 2007, v. 4, p. 63, doi. 10.28945/933
- By:
- Publication type:
- Article
IDENTIFICATION OF LEGAL ISSUES FOR COMPUTER FORENSICS.
- Published in:
- Information Systems Management, 2005, v. 22, n. 2, p. 57, doi. 10.1201/1078/45099.22.2.20050301/87278.7
- By:
- Publication type:
- Article
Computer Forensics: An Essential Ingredient for Cyber Security.
- Published in:
- Journal of Information Science & Technology, 2006, v. 3, n. 1, p. 22
- By:
- Publication type:
- Article
Effectiveness of Forensic Computer Modeling for Predicting Wartime Crimes.
- Published in:
- Pakistan Journal of Criminology, 2024, v. 16, n. 2, p. 601, doi. 10.62271/pjc.16.2.601.618
- By:
- Publication type:
- Article
Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach.
- Published in:
- Journal of Digital Forensics, Security & Law, 2010, v. 5, n. 2, p. 63
- By:
- Publication type:
- Article
ANÁLISIS DE LAS HERRAMIENTAS INFORMÁTICAS UTILIZADAS EN UNA AUDITORÍA FORENSE EN LAS COOPERATIVAS DE AHORRO Y CRÉDITO.
- Published in:
- Revista Fatec Zona Sul (REFAS), 2021, v. 7, n. 3, p. 1
- By:
- Publication type:
- Article
Windows Forensics: The Field Guide for Corporate Computer Investigations.
- Published in:
- 2006
- Publication type:
- Book Review
Forensic Computer Investigation Brings Notorious Serial Killer BTK to Justice.
- Published in:
- Forensic Examiner, 2005, v. 14, n. 4, p. 55
- By:
- Publication type:
- Article
Computer Forensics of Hacked Websites.
- Published in:
- International Journal of Design, Analysis & Tools for Integrated Circuits & Systems, 2024, v. 13, n. 1, p. 1
- By:
- Publication type:
- Article
Computer Forensics Gear.
- Published in:
- Internal Auditor, 2001, v. 58, n. 4, p. 27
- Publication type:
- Article
Computer forensics.
- Published in:
- Internal Auditor, 2000, v. 57, n. 1, p. 53
- By:
- Publication type:
- Article
FORENZIKA RAČCUNARSKIH MREŽA.
- Published in:
- Military Technical Courier / Vojnotehnicki Glasnik, 2013, v. 61, n. 1, p. 136, doi. 10.5937/vojtehg61-1493
- By:
- Publication type:
- Article
Erratum to: Using immersive virtual reality and anatomically correct computer-generated characters in the forensic assessment of deviant sexual preferences.
- Published in:
- 2015
- By:
- Publication type:
- Erratum
Computer Forensic: An Evidence of various analytical tools for legal constitution.
- Published in:
- Beyond Limits.... IJAITI: International Journal of Advance Innovations, Thoughts & Ideas, 2012, v. 1, n. 2, p. 1
- By:
- Publication type:
- Article
Advantages of Computer Generated Evidence: Forensic Animation in Indian Judiciary System.
- Published in:
- Indian Journal of Forensic Medicine & Toxicology, 2014, v. 8, n. 1, p. 136, doi. 10.5958/j.0973-9130.8.1.029
- By:
- Publication type:
- Article
COMPUTER FORENSICS AND CYBER SECURITY.
- Published in:
- 2007
- By:
- Publication type:
- Editorial