Found: 6
Select item for more details and to access through your institution.
From the Editor.
- Published in:
- Journal of Digital Forensics, Security & Law, 2011, v. 6, n. 2, p. 5
- By:
- Publication type:
- Article
Column: Every Last Byte.
- Published in:
- Journal of Digital Forensics, Security & Law, 2011, v. 6, n. 2, p. 7
- By:
- Publication type:
- Article
SAMPLING: MAKING ELECTRONIC DISCOVERY MORE COST EFFECTIVE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2011, v. 6, n. 2, p. 9
- By:
- Publication type:
- Article
KINDLE FORENSICS: ACQUISITION & ANALYSIS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2011, v. 6, n. 2, p. 17
- By:
- Publication type:
- Article
DEVELOPING A FORENSIC CONTINUOUS AUDIT MODEL.
- Published in:
- Journal of Digital Forensics, Security & Law, 2011, v. 6, n. 2, p. 25
- By:
- Publication type:
- Article
Technology Corner Analysing E-Mail Headers for Forensic Investigation.
- Published in:
- Journal of Digital Forensics, Security & Law, 2011, v. 6, n. 2, p. 49
- By:
- Publication type:
- Article