Works matching IS 15587215 AND DT 2012 AND VI 7 AND IP 2
Results: 10
Technology Corner Automated Data Extraction Using Facebook.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 149
- By:
- Publication type:
- Article
System Forensics, Investigation, and Response.
- Published in:
- 2012
- By:
- Publication type:
- Book Review
Identifying Trace Evidence from Target-Specific Data, Wiping Application Software.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 113
- By:
- Publication type:
- Article
Identifying and Attributing Similar Traces with Greatest Common Factor Analysis.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 89
- By:
- Publication type:
- Article
Digital Evidence Education in Schools of Law.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 75
- By:
- Publication type:
- Article
Toward Alignment between Communities of Practice and Knowledge-Based Decision Support.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 61
- By:
- Publication type:
- Article
Automated Identification and Reconstruction of YouTube Video Access.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 43
- By:
- Publication type:
- Article
DNS in Computer Forensics.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 11
- By:
- Publication type:
- Article
Column: Factors Affecting Data Decay.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 7
- By:
- Publication type:
- Article
From the Guest Editor.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 5
- By:
- Publication type:
- Article