


default search action
Journal of Digital Forensics, Security and Law, Volume 6
Volume 6, Number 1, 2011
- Fred Cohen:

Column: Putting the Science in Digital Forensics. 7-14 - David Irwin, Jill Slay, Arek Dadej, Malcolm Shore:

Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM. 15-36 - Fred Cohen:

A Case Study in Forensic Analysis of Control. 37-54 - Gary C. Kessler:

Judges Awareness, Understanding, and Application of Digital Evidence. 55-72 - Christopher Schulte:

Book Review: iOS Forensic Analysis: For iPhone, iPad and iPod Touch. 73-76 - Nick Flor, Kenneth Guillory:

Technology Corner: Internet Packet Sniffers. 77-90
Volume 6, Number 2, 2011
- Simson L. Garfinkel

:
Column: Every Last Byte. 7-8 - Milton H. Luoma, Vicki Miller Luoma:

Sampling: Making Electronic Discovery More Cost Effective. 9-16 - Peter Hannay:

Kindle Forensics: Acquisition & Analysis. 17-24 - Grover S. Kearns:

Developing a Forensic Continuous Audit Model. 25-48 - M. Tariq Banday

:
Technology Corner: Analysing E-mail Headers For Forensic Investigation. 49-64
Volume 6, Number 3, 2011
- Christopher Kelley:

Column: The Consortium of Digital Forensics Specialists (CDFS). 7-10 - Fred Cohen:

Column: The Physics of Digital Information. 11-16 - Patryk Szewczyk:

Analysis of Data Remaining on Second Hand ADSL Routers. 17-30 - Mario Piccinelli, Paolo Gubian:

Exploring the iPhone Backup made by iTunes. 31-62 - Gregory H. Carlton, Joe Matsumoto:

A survey of contemporary enterprise storage technologies from a digital forensics perspective. 63-74 - Darlene M. Tester:

Book Review: Online Privacy: Issues in the Digital Age. 75-78 - Nick Flor, Haile Shannon:

Technology Corner: Brute Force Password Generation - Basic Iterative and Recursive Algorithms. 79-86
Volume 6, Number 4, 2011
- Simson L. Garfinkel

:
Column: File Cabinet Forensics. 7-10 - Timothy James LaTulippe:

Working Inside The Box: An Example Of Google Desktop Search in a Forensic Examination. 11-18 - Thomas Lonardo, Tricia Martland, Doug White, Alan Rea:

Legal Issues Regarding Digital Forensic Examiners Third Party Consent to Search. 19-34 - Matthew Phillip Simon:

Investigating Modern Communication Technologies: The effect of Internet-based Communication Technologies on the Investigation Process. 35-62 - Christopher Schulte:

Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. 63-66 - Nick Flor:

Technology Corner: Virtual Crime Scene Reconstruction: The Basics of 3D Modeling. 67-74

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














