Computer forensics: Are you qualified?

被引:0
|
作者
机构
来源
Comput. Fraud Secur. | 2008年 / 12卷 / 18-20期
关键词
D O I
10.1016/S1361-3723(08)70179-9
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Security and privacy in the Computer Forensics context
    Sirinivasan, S.
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 226 - 228
  • [32] The Research of the constructing Based on the Computer Forensics
    Zhao Qing-shan
    Wu Shao-bing
    Ma Xue-ming
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 254 - 257
  • [33] Digital Profiling: A Computer Forensics Approach
    Colombini, Clara
    Colella, Antonio
    Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011, 6908 : 330 - 343
  • [34] Legal system and computer forensics business
    Takahashi, I
    2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2004, : 74 - 77
  • [35] Computer Forensics-Digitized Science
    Bahadur, Promila
    Yadav, Divakar Singh
    2015 SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2015, : 1025 - 1031
  • [36] Research the Computer Forensics Based on Network
    Hu Jingfang
    Li Busheng
    MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2282 - 2285
  • [37] Criminal Defense Challenges in Computer Forensics
    Mercuri, Rebecca
    DIGITAL FORENSICS AND CYBER CRIME, 2010, 31 : 132 - 138
  • [38] The Research on the Tactic of Computer Static Forensics
    Liu, Huaihui
    2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 207 - 212
  • [39] Computer Forensics: Cybercriminals, Laws, and Evidence
    Yu, Szde
    INTERNATIONAL CRIMINAL JUSTICE REVIEW, 2013, 23 (01) : 103 - 104
  • [40] Computer Forensics: Cybercriminals, Laws, and Evidence
    Yu, Szde
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2013, 5 (02) : 63 - 66