default search action
Journal of Digital Forensics, Security and Law, Volume 4
Volume 4, Number 1, 2009
- Grover S. Kearns:
Graduate Accounting Students' Perception of IT Forensics: A Multi-Dimensional Analysis. 5-38 - Peter J. Best, Pall Rikhardsson, Mark Toleman:
Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis. 39-60 - Stevenson G. Smith, Larry D. Crumbley:
Defining a Forensic Audit. 61-80
Volume 4, Number 2, 2009
- Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre:
Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers. 5-26 - Craig Valli:
Visualisation of Honeypot Data Using Graphviz and Afterglow. 27-38 - Damir Kahvedzic, M. Tahar Kechadi:
Correlating Orphaned Windows Registry Data Structures. 39-56 - Dennis Browning, Gary C. Kessler:
Bluetooth Hacking: A Case Study. 57-72 - Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth:
The Impact of Hard Disk Firmware Steganography on Computer Forensics. 73-84
Volume 4, Number 3, 2009
- Craig Valli, Patryk Szewczyk:
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. 5-16 - Andy Luse, Brian E. Mennecke, Anthony M. Townsend:
Electronic Forms-Based Computing for Evidentiary Analysis. 17-34 - Thomas Lonardo, Doug White, Alan Rea:
To License or Not to License Revisited: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. 35-56 - Gary C. Kessler:
Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions. 57-60
Volume 4, Number 4, 2009
- Mohamed Chawki:
Online Child Sexual Abuse: The French Response. 7-42 - Francis S. Cronjé:
A Synopsis of Proposed Data Protection Legislation in SA. 43-50 - Jacqueline Fick:
Prevention is Better than Prosecution: Deepening the Defence against Cyber Crime. 51-72 - Z. Ntozintle Jobodwana:
Telecommunications Liberalisation in Africa: Proposed Regulatory Model for the SADC Region. 73-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.