Search Results - "Computer Forensic Methods"
-
1
Authors:
Source: Texts in Computer Science.
Subject Terms: Digital Forensics, Computer Forensics, Criminal Investigation, Password Cracking, Forensics, AccessData, Computer Examination, Live Forensics, Computer Forensic Methods
File Description: print
-
2
Authors:
Contributors:
Source: http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf.
File Description: application/pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf -
3
Authors: et al.
Source: Journal of Information Technology Management (JITM); 2023, Vol. 15 Issue 1, p135-162, 28p
-
4
Authors:
Source: Journal of Internet Services and Information Security. 15:409-422
-
5
Authors: et al.
Source: Computers, Materials & Continua; 2024, Vol. 80 Issue 3, p4833-4857, 25p
Subject Terms: ARCHITECTURAL design, MACHINE learning, INTERNET security, CLASSIFICATION, ENGINEERING
-
6
Authors: et al.
Source: IETE Journal of Research; Nov2023, Vol. 69 Issue 11, p8058-8066, 9p
-
7
Authors: Monina Schwarz
Source: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. :1983-1985
Subject Terms: 9. Industry and infrastructure, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 16. Peace & justice
-
8
Authors: et al.
Source: 2012 IEEE Seventh International Conference on Networking, Architecture & Storage; 1/ 1/2012, p49-58, 10p
-
9
Authors:
Source: Advances in Digital Forensics; 2005, p43-50, 8p
-
10
Authors: et al.
Source: SCIENCE CHINA Information Sciences; Feb2014, Vol. 57 Issue 3, p1-20, 20p
-
11
Authors: Box, Ron
Source: Practicing CPA; Feb2009, Vol. 33 Issue 2, p1-4, 4p, 1 Chart
Subject Terms: RECORDS retention, ACCOUNTING firms, CONFIDENTIAL records, DATA integrity, ACCESS to information, DOCUMENT imaging systems, UNITED States. Sarbanes-Oxley Act of 2002
Geographic Terms: UNITED States
-
12
Authors: Welander, Peter
Source: Control Engineering; Apr2007, Vol. 54 Issue 4, p38-44, 5p
Subject Terms: COMPUTER security, PUBLIC utilities, COMPUTER network security, AUTOMATIC control systems, AUTOMATION
Company/Entity: NORTH American Electric Reliability Corp.
-
13
Authors: SCHNEIDER, FRED B.
Source: IEEE Security & Privacy; Mar/Apr2009, Vol. 7 Issue 2, p3-4, 2p
-
14
Authors: Aminata Taal
Source: International Journal of Electronic Security and Digital Forensics. 1:125
Subject Terms: 9. Industry and infrastructure, 16. Peace & justice
-
15
-
16
Authors: Landwehr, Carl E.
Source: IEEE Security & Privacy; Mar/Apr2009, Vol. 7 Issue 2, p4-4, 1/2p
-
17
Authors: By:CHARLES PILLER
Source: Los Angeles Times, July 8, 2002 PA Home Edition, 4pp
-
18
Authors: et al.
Resource Type: eBook.
-
19
Authors:
Resource Type: eBook.
Subjects: Smart cities, 5G mobile communication systems
Categories: COMPUTERS / Networking / General, COMPUTERS / Computer Engineering, TECHNOLOGY & ENGINEERING / Electrical, TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications
-
20
Authors:
Resource Type: eBook.
Subjects: Blockchains (Databases)
Categories: TECHNOLOGY & ENGINEERING / Telecommunications, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Security / General, TECHNOLOGY & ENGINEERING / Engineering (General)
Nájsť tento článok vo Web of Science
Full Text Finder