Výsledky vyhledávání - Computer Forensics Report
-
1
Autoři:
Zdroj: RUC. Repositorio da Universidade da Coruña
Universidade da Coruña (UDC)Témata: Cifrado, Android, Computer Forensics Report, Ransomware, Encryption, Malware, Informe forense informático, 3. Good health
Přístupová URL adresa: http://hdl.handle.net/2183/34157
-
2
Autoři:
Zdroj: Journal of forensic sciences [J Forensic Sci] 2025 Jul; Vol. 70 (4), pp. 1571-1583. Date of Electronic Publication: 2025 May 14.
Způsob vydávání: Journal Article
Informace o časopise: Publisher: Blackwell Pub Country of Publication: United States NLM ID: 0375370 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1556-4029 (Electronic) Linking ISSN: 00221198 NLM ISO Abbreviation: J Forensic Sci Subsets: MEDLINE
Výrazy ze slovníku MeSH: Forensic Sciences*/standards , Forensic Sciences*/methods , Image Processing, Computer-Assisted*, Humans ; Bayes Theorem
-
3
Autoři:
Zdroj: Proceedings, Vol 54, Iss 1, p 49 (2020)
Témata: computer forensics, forensic reports, cyber security, multi-platform, open source, forensics tool, General Works
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/8306edf2039e44d0b69c66232f0f5cdc
-
4
Autoři: Nikoloska, Svetlana
Zdroj: International Scientific Conference on Security & Euroatlantic Perspectives of the Balkans Police Science & Police Profession; 2024, Issue 1, p192-202, 11p
Geografický termín: NORTH Macedonia
-
5
Autoři: a další
Zdroj: Applied Sciences (2076-3417); Jun2024, Vol. 14 Issue 12, p5302, 37p
-
6
Autoři:
Přispěvatelé:
Zdroj: Oxford Handbook of Personality Assessment.
-
7
Autoři:
Zdroj: Association of Small Computer Users in Education (ASCUE). 2005 38th.
Peer Reviewed: N
Page Count: 12
Descriptors: Computers, Federal Legislation, Debate
-
8
Autoři: William Oettinger
Resource Type: eBook.
Témata: Electronic evidence, Hackers, Computer security, Computer crimes--Investigation, Criminal investigation
Categories: COMPUTERS / Internet / Online Safety & Privacy, COMPUTERS / Networking / Network Protocols, COMPUTERS / Security / Network Security
-
9
Autoři:
Resource Type: eBook.
Categories: COMPUTERS / Security / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Image Processing, COMPUTERS / Artificial Intelligence / Computer Vision & Pattern Recognition, COMPUTERS / Interactive & Multimedia, MATHEMATICS / Probability & Statistics / General
Plný text ve formátu PDF Plný text ve formátu ePub -
10
Autoři: a další
Zdroj: PeerJ Computer Science; Aug2024, p1-38, 38p
-
11
Autoři: PILSKI, Marek
Zdroj: Studia Informatica. System & information technology; 2022, Vol. 26 Issue 1, p73-84, 12p
-
12
Autoři:
Zdroj: International Journal of Design, Analysis & Tools for Integrated Circuits & Systems; Feb2024, Vol. 13 Issue 1, p1-4, 4p
-
13
Autoři: a další
Zdroj: Journal of Information Technology Management (JITM); 2023, Vol. 15 Issue 1, p135-162, 28p
-
14
Autoři:
Zdroj: Computer Systems Science & Engineering; 2023, Vol. 45 Issue 2, p2071-2092, 22p
-
15
Autoři:
Resource Type: eBook.
-
16
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials.
Autoři: a další
Zdroj: Journal of Digital Forensic Practice; Jan2010, Vol. 3 Issue 1, p23-32, 10p, 1 Diagram, 7 Charts
-
17
Autoři: a další
Zdroj: Annual ADFSL Conference on Digital Forensics, Security and Law
Témata: Computer Engineering, Computer Law, Computer Sciences, Electrical and Computer Engineering, Forensic Science and Technology, Information Security
Dostupnost: https://commons.erau.edu/adfsl/2010/thursday/2
-
18
Autoři: a další
Zdroj: AIP Conference Proceedings; 2023, Vol. 2938 Issue 1, p1-10, 10p
-
19
Autoři: a další
Relation: https://zenodo.org/communities/apsproceedings/; https://zenodo.org/records/7832227; oai:zenodo.org:7832227; https://doi.org/10.5281/zenodo.7832227
-
20
Autoři:
Zdroj: International Journal of Information Security & Cybercrime; 2015, Vol. 4 Issue 2, p9-20, 12p
Témata: CRIMINAL investigation, COMPUTER crimes
Nájsť tento článok vo Web of Science
Full Text Finder