Works matching IS 15587215 AND DT 2013
Results: 43
iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
TECHNOLOGY CORNER: CALCULATING THE NUMBER OF ANDROID LOCK PATTERNS: AN UNFINISHED STUDY IN NUMBER THEORY.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 4, p. 57
- By:
- Publication type:
- Article
SCIENCE COLUMN: RECONSTRUCTION: THE EXPERIMENTAL SIDE OF DIGITAL FORENSICS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 4, p. 49
- By:
- Publication type:
- Article
THE ADVANCED DATA ACQUISITION MODEL (ADAM): A PROCESS MODEL FOR DIGITAL FORENSIC PRACTICE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 4, p. 25
- By:
- Publication type:
- Article
ANALYSIS OF A SECOND HAND GOOGLE MINI SEARCH APPLIANCE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 4, p. 7
- By:
- Publication type:
- Article
From the (Incoming) Editor-in-Chief.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 4, p. 5
- By:
- Publication type:
- Article
From the Editor-in-Chief.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 4, p. 5
- By:
- Publication type:
- Article
Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
SYSTEM-GENERATED DIGITAL FORENSIC EVIDENCE IN GRAPHIC DESIGN APPLICATIONS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 71
- By:
- Publication type:
- Article
MONEY LAUNDERING DETECTION FRAMEWORK TO LINK THE DISPARATE AND EVOLVING SCHEMES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 41
- By:
- Publication type:
- Article
TRENDS IN ANDROID MALWARE DETECTION.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 21
- By:
- Publication type:
- Article
RISK MANAGEMENT OF EMAIL AND INTERNET USE IN THE WORKPLACE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 7
- By:
- Publication type:
- Article
From the Editor-in-Chief.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 5
- By:
- Publication type:
- Article
WORKSHOP & PANEL: DIGITAL FORENSICS READINESS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 161
- Publication type:
- Article
A FORENSIC STUDY OF THE EFFECTIVENESS OF SELECTED ANTI-VIRUS PRODUCTS AGAINST SSDT HOOKING ROOTKITS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 137
- By:
- Publication type:
- Article
AN ONTOLOGY-BASED FORENSIC ANALYSIS TOOL.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 121
- By:
- Publication type:
- Article
FIRST GLANCE: AN INTRODUCTORY ANALYSIS OF NETWORK FORENSICS OF TOR.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 105
- By:
- Publication type:
- Article
SIGNIFICANCE OF SEMANTIC RECONCILIATION IN DIGITAL FORENSICS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 69
- By:
- Publication type:
- Article
JOURNEY INTO WINDOWS 8 RECOVERY ARTIFACTS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 87
- By:
- Publication type:
- Article
AN IMAGE FORENSIC SCHEME WITH ROBUST AND FRAGILE WATERMARKING FOR BUSINESS DOCUMENTS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 81
- By:
- Publication type:
- Article
INVESTIGATING THE PROFESSIONALIZATION OF THE FIELD OF DIGITAL FORENSICS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 80
- Publication type:
- Article
KEYNOTE SPEAKER.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 79
- By:
- Publication type:
- Article
A THEMATIC REVIEW OF USER COMPLIANCE WITH INFORMATION SECURITY POLICIES LITERATURE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 101
- By:
- Publication type:
- Article
SYSTEM-GENERATED DIGITAL FORENSIC EVIDENCE IN GRAPHIC DESIGN APPLICATIONS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 57
- By:
- Publication type:
- Article
MONEY LAUNDERING DETECTION FRAMEWORK TO LINK THE DISPARATE AND EVOLVING SCHEMES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 33
- By:
- Publication type:
- Article
KEYNOTE SPEAKER WHAT'S NOT TO TRUST?
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 31
- By:
- Publication type:
- Article
WORKSHOP 1 AND PANEL: EXAMINING THE FORENSIC EXPERT.
- Published in:
- 2013
- Publication type:
- Proceeding
IDENTIFYING PEER-TO-PEER TRAFFIC ON SHARED WIRELESS NETWORKS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 25
- By:
- Publication type:
- Article
KEYNOTE SPEAKER.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 23
- By:
- Publication type:
- Article
ON RESOLVING THE CLOUD FORENSICS CONUNDRUM.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 21
- By:
- Publication type:
- Article
CYBERCRIME AND PUNISHMENT: AN ANALYSIS OF THE DEONTOLOGICAL AND UTILITARIAN FUNCTIONS OF PUNISHMENT IN THE INFORMATION AGE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 15
- By:
- Publication type:
- Article
THE DEVELOPMENT OF COMPUTER FORENSIC LEGAL SYSTEM IN CHINA.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 9
- By:
- Publication type:
- Article
Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
TECHNOLOGY CORNER VISUALISING FORENSIC DATA: EVIDENCE GUIDELINES (PART 2).
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 93
- By:
- Publication type:
- Article
HOW OFTEN IS EMPLOYEE ANGER AN INSIDER RISK II? DETECTING AND MEASURING NEGATIVE SENTIMENT VERSUS INSIDER RISK IN DIGITAL COMMUNICATIONS COMPARISON BETWEEN HUMAN RATERS AND PSYCHOLINGUISTIC SOFTWARE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 73
- By:
- Publication type:
- Article
INFORMATION SECURITY CHALLENGE OF QR CODES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 43
- By:
- Publication type:
- Article
AUTOMATING VENDOR FRAUD DETECTION IN ENTERPRISE SYSTEMS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 7
- By:
- Publication type:
- Article
From the Editor-in-Chief.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 2, p. 5
- By:
- Publication type:
- Article
TECHNOLOGY CORNER VISUALISING FORENSIC DATA: EVIDENCE (PART 1).
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 1, p. 73
- By:
- Publication type:
- Article
How often is Employee Anger an Insider Risk I? Detecting and Measuring Negative Sentiment versus Insider Risk in Digital Communications.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 1, p. 39
- By:
- Publication type:
- Article
A SIMPLE EXPERIMENT WITH MICROSOFT OFFICE 2010 AND WINDOWS 7 UTILIZING DIGITAL FORENSIC METHODOLOGY.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 1, p. 17
- By:
- Publication type:
- Article
MEASURING INCONSISTENCY METHODS FOR EVIDENTIARY VALUE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 1, p. 7
- By:
- Publication type:
- Article
From the Editor-in-Chief.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 1, p. 5
- By:
- Publication type:
- Article