default search action
Journal of Digital Forensics, Security and Law, Volume 3
Volume 3, Number 1, 2008
- Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland:
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. 5-24 - Vivienne Mee:
Who is Reading the Data on Your Old Computer? 25-34 - Timothy Pavlic, Jill Slay, Benjamin P. Turnbull:
Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications. 35-56 - Gary C. Kessler:
Book Review: Challenges to Digital Forensic Evidence. 57-60
Volume 3, Number 2, 2008
- Diane Barrett:
Trends in Virtualized User Environments. 5-16 - Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Steganography: Forensic, Security, and Legal Issues. 17-34 - Rekha Bhowmik:
Data Mining Techniques in Fraud Detection. 35-54 - Andy Jones, Craig Valli, Iain Sutherland:
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market. 55-70 - Gary C. Kessler:
Book Review: The dotCrime Manifesto: How to Stop Internet Crime. 71-74
Volume 3, Number 3, 2008
- Joseph J. Schwerha, Scott Inch:
Remote Forensics May Bring the Next Sea Change in E-discovery: Are All Networked Computers Now Readily Accessible Under the Revised Federal Rules of Civil Procedure? 5-28 - Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin Wylie Manes:
The Forensics Aspects of Event Data Recorders. 29-42 - Gregory H. Carlton:
An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh. 43-60 - Thomas Lonardo, Doug White, Alan Rea:
To License or Not to License: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. 61-80 - Keyu Jiang, Ruifeng Xuan:
Book Review: Guide to computer forensics and investigations (3rd ed.). 81-84
Volume 3, Number 4, 2008
- N. Mlitwa, Y. Kachala:
Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action. 5-22 - Damir Kahvedzic, M. Tahar Kechadi:
Extraction and Categorisation of User Activity from Windows Restore Points. 23-42 - Satheesaan Pasupatheeswaran:
Data recovery from PalmmsgV001. 43-58 - Gary C. Kessler:
Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit. 59-62
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.