Found: 10
Select item for more details and to access through your institution.
System Forensics, Investigation, and Response.
- Published in:
- 2012
- By:
- Publication type:
- Book Review
Technology Corner Automated Data Extraction Using Facebook.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 149
- By:
- Publication type:
- Article
Identifying Trace Evidence from Target-Specific Data, Wiping Application Software.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 113
- By:
- Publication type:
- Article
Identifying and Attributing Similar Traces with Greatest Common Factor Analysis.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 89
- By:
- Publication type:
- Article
Digital Evidence Education in Schools of Law.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 75
- By:
- Publication type:
- Article
Automated Identification and Reconstruction of YouTube Video Access.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 43
- By:
- Publication type:
- Article
Toward Alignment between Communities of Practice and Knowledge-Based Decision Support.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 61
- By:
- Publication type:
- Article
DNS in Computer Forensics.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 11
- By:
- Publication type:
- Article
Column: Factors Affecting Data Decay.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 7
- By:
- Publication type:
- Article
From the Guest Editor.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 5
- By:
- Publication type:
- Article