Volume 5,
Numbers 1-2,
September 2008
Volume 5,
Numbers 3-4,
March 2009
- Eoghan Casey:
"Dawn raids" bring a new form in incident response.
73-74
Electronic Edition (link) BibTeX
- Jesse D. Kornblum:
Implementing BitLocker Drive Encryption for forensic analysis.
75-84
Electronic Edition (link) BibTeX
- N. R. Poole, Q. Zhou, P. Abatis:
Analysis of CCTV digital video recorder hard disk storage system.
85-92
Electronic Edition (link) BibTeX
- Murilo Tito Pereira:
Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records.
93-103
Electronic Edition (link) BibTeX
- Bora Park, Jungheum Park, Sangjin Lee:
Data concealment and detection in Microsoft Office 2007 files.
104-114
Electronic Edition (link) BibTeX
- Martin S. Olivier:
On metadata context in Database Forensics.
115-123
Electronic Edition (link) BibTeX
- Rachid Hadjidj, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem:
Towards an integrated e-mail forensic analysis framework.
124-137
Electronic Edition (link) BibTeX
- M. I. Cohen:
Source attribution for network address translated forensic captures.
138-145
Electronic Edition (link) BibTeX
- Peter Sommer:
Meetings between experts: A route to simpler, fairer trials?
146-152
Electronic Edition (link) BibTeX
- Peter F. R. Forster:
Steve Anson and Steve Bunting, Mastering Windows network forensics and investigations , Sybex (an imprint of Wiley Publishing Inc.), US and Canada (2007) ISBN 978-0-4700-9762-5 530 pp.
153-154
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:56:36 2009
by Michael Ley (ley@uni-trier.de)