Computer forensics: Are you qualified?

被引:0
|
作者
机构
来源
Comput. Fraud Secur. | 2008年 / 12卷 / 18-20期
关键词
D O I
10.1016/S1361-3723(08)70179-9
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] CRIME INVESTIGATION: A COURSE IN COMPUTER FORENSICS
    Lim, Nena
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2006, 18 : 205 - 225
  • [42] Computer forensics: Past, present and future
    Culley, Adrian
    Information Security Technical Report, 2003, 8 (02): : 32 - 36
  • [43] Formalizing Computer Forensics Process with UML
    Ruan, Chun
    Huebner, Ewa
    INFORMATION SYSTEMS: MODELING, DEVELOPMENT, AND INTEGRATION: THIRD INTERNATIONAL UNITED INFORMATION SYSTEMS CONFERENCE, UNISCON 2009, 2009, 20 : 184 - 189
  • [44] Exploratory Study on Computer Forensics Technology
    Hu, Dan
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 608 - 611
  • [45] Emerging paper standards in computer forensics
    Ballou, Susan
    Gilliland, Rhesa G.
    DIGITAL INVESTIGATION, 2011, 8 (02) : 96 - 97
  • [46] Identification of legal issues for computer forensics
    Brungs, A
    Jamieson, R
    INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (02) : 57 - 66
  • [47] Computer Forensics in GSM cell phones
    Cano, Jeimy
    CIENCIA UNEMI, 2008, 1 (01): : 20 - 25
  • [48] The Class of Information Crime and Computer Forensics
    Ling, Tang
    PROCEEDINGS OF THE 2016 INTERNATIONAL SEMINAR ON EDUCATION INNOVATION AND ECONOMIC MANAGEMENT (SEIEM 2016), 2016, 75 : 477 - 480
  • [49] The future implications of computer forensics on VoIP
    Jones, A
    DIGITAL INVESTIGATION, 2005, 2 (03) : 206 - 208
  • [50] Computer Forensics System Based On Honeypot
    Li, Zi Chen
    Li, Xiao Jia
    Gong, Lei
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 336 - 337