


default search action
Journal of Digital Forensics, Security and Law, Volume 3
Volume 3, Number 1, 2008
- Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland:

The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. 5-24 - Vivienne Mee:

Who is Reading the Data on Your Old Computer? 25-34 - Timothy Pavlic, Jill Slay, Benjamin P. Turnbull:

Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications. 35-56 - Gary C. Kessler:

Book Review: Challenges to Digital Forensic Evidence. 57-60
Volume 3, Number 2, 2008
- Diane Barrett:

Trends in Virtualized User Environments. 5-16 - Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:

Steganography: Forensic, Security, and Legal Issues. 17-34 - Rekha Bhowmik:

Data Mining Techniques in Fraud Detection. 35-54 - Andy Jones, Craig Valli, Iain Sutherland:

Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market. 55-70 - Gary C. Kessler:

Book Review: The dotCrime Manifesto: How to Stop Internet Crime. 71-74
Volume 3, Number 3, 2008
- Joseph J. Schwerha, Scott Inch:

Remote Forensics May Bring the Next Sea Change in E-discovery: Are All Networked Computers Now Readily Accessible Under the Revised Federal Rules of Civil Procedure? 5-28 - Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin Wylie Manes:

The Forensics Aspects of Event Data Recorders. 29-42 - Gregory H. Carlton:

An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh. 43-60 - Thomas Lonardo, Doug White, Alan Rea:

To License or Not to License: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. 61-80 - Keyu Jiang, Ruifeng Xuan:

Book Review: Guide to computer forensics and investigations (3rd ed.). 81-84
Volume 3, Number 4, 2008
- N. Mlitwa, Y. Kachala:

Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action. 5-22 - Damir Kahvedzic, M. Tahar Kechadi:

Extraction and Categorisation of User Activity from Windows Restore Points. 23-42 - Satheesaan Pasupatheeswaran:

Data recovery from PalmmsgV001. 43-58 - Gary C. Kessler:

Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit. 59-62

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














