


default search action
Journal of Digital Forensic Practice, Volume 3
Volume 3, Number 1, 2010
- Mark Pollitt:

Forensic Twitter. 1-3
- Lorie M. Liebrock, Brajendra Panda, Robert L. Hutchinson:

Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing. 4
- John H. Riley Jr.:

Recycling in Vista®. 5-10 - Gary C. Kessler, Don A. Haggerty:

An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview. 11-22 - Alfred C. Bogen, David A. Dampier, Rayford B. Vaughn, Donna S. Reese

, Edward B. Allen, Jeffrey C. Carver:
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials. 23-32 - Pawel Zwan, Andrzej Czyzewski

:
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger. 33-45 - Yinghua Guo, Jill Slay

:
Testing Forensic Copy Function of Computer Forensics Investigation Tools. 46-61
- Gary C. Kessler:

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility. By A. Jones and C. Valli. 62-63 - Gary C. Kessler:

Windows Forensic Analysis DVD Toolkit, 2nd edition. By Harlan Carvey. 64-66
Volume 3, Numbers 2-4, 2010
- Lawrence Suffern:

A Study of Current Trends in Database Forensics. 67-73 - Kamaruddin Malik Mohamad, Ahmed Patel, Tutut Herawan

, Mustafa Mat Deris:
myKarve: JPEG Image and Thumbnail Carver. 74-97 - Edward H. Freeman:

Computer Printouts as Legal Evidence. 98-105 - Rafael Etges, Emma Sutcliffe:

An Overview of Transnational Organized Cyber Crime. 106-114 - Jonathan Matusitz:

Cyberterrorism: Postmodern State of Chaos. 115-123 - Kenneth Geers:

The Cyber Threat to National Critical Infrastructures: Beyond Theory. 124-130 - Greg Gogolin, James Jones:

Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business. 131-139 - Angela Brungs, Rodger Jamieson:

Identification of Legal Issues for Computer Forensics. 140-149 - Thomas Gloe, Rainer Böhme:

The Dresden Image Database for Benchmarking Digital Image Forensics. 150-159

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














