Forensics

Results: 1448



#Item
361Disk file systems / Computer file formats / Disk editor / Utility software / NTFS / File system / Disk cloning / Disk partitioning / Data recovery / System software / Computing / Software

X-Ways Software Technology AG X-Ways Forensics Integrated Computer Forensics Environment Advanced Data Recovery and IT Security Software in English, German, French, Spanish, Italian, and Portuguese

Add to Reading List

Source URL: x-ways.com

Language: English - Date: 2004-10-05 12:43:43
362Information technology audit / Mobile device forensics / Science / MultiMediaCard / Siemens / Digital forensics

Smart TV Forensics A.Boztas M. Roeloffs

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-29 01:21:34
363Orthotropic deck / Suspension bridge / San Francisco – Oakland Bay Bridge / Weidlinger Associates / Seismic retrofit / Self-anchored suspension bridge / Eastern span replacement of the San Francisco – Oakland Bay Bridge / Cable-stayed bridge / Bridges / California / Civil engineering

Weidlinger Associates, Inc., is a 300-person structural engineering firm that designs and rehabilitates buildings, bridges, and infrastructure and provides special services in applied science, forensics, and physical sec

Add to Reading List

Source URL: www.wai.com

Language: English - Date: 2015-01-21 11:55:18
364Cognition / Domain-specific language / Mathematical model / Digital forensics / Conceptual model / Digital subscriber line / Modeling language / Ethology / Scientific modeling / Mathematics

Models of Models: Digital Forensics and Domain-Specific Languages (Extended Abstract) Daniel A. Ray∗

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-12 21:40:06
365Criminal procedure / Evidence law / Digital forensics / United States v. Hubbell / Immunity from prosecution / Subpoena duces tecum / Kastigar v. United States / Fifth Amendment to the United States Constitution / Self-incrimination / Law / Disk encryption / Criminal law

Article: a combination or a key? the fifth amendment

Add to Reading List

Source URL: sas-space.sas.ac.uk

Language: English - Date: 2015-03-03 12:09:36
366Tor / System software / Computing / Windows XP / Prefetcher / Portable software / Software / Internet privacy / Cryptographic software

TOR BROWSER FORENSICS ON WINDOWS OS MATTIA EPIFANI, FRANCESCO PICASSO, MARCO SCARITO, CLAUDIA MEDA DFRWS 2015 DUBLIN, 24 MARCH 2015 REAL CASE

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-24 11:39:52
367

California Sciences Institute The State of the Science of Digital Evidence Examination IFIP Forensics Conference – Jan 31- Feb 2, 2011

Add to Reading List

Source URL: all.net

Language: English - Date: 2010-12-13 23:58:18
    368Forensic science / Heuristics / Forensic identification / Expert witness / Crime / Outline of forensic science / Department of Defense Cyber Crime Center / Digital forensics / Law / Criminology

    Digital Forensic Evidence Examination Digital Forensic Evidence Examination

    Add to Reading List

    Source URL: all.net

    Language: English - Date: 2013-08-08 09:02:22
    369Digital signal processing / Computing / Binary arithmetic / Bit / Digital / Disk storage / Digital physics / Comparison of analog and digital recording / Electronics / Digital forensics / Technology

    Journal of Digital Forensics, Security and Law, VolColumn: The Physics of Digital Information1 Fred Cohen One of the interesting questions underlying creating a science of digital forensics is what form that scie

    Add to Reading List

    Source URL: all.net

    Language: English - Date: 2012-09-01 08:58:53
    370

    California Sciences Institute Bulk Email Forensics HTCIA - Aug 22-25, 2009 Dr. Fred Cohen

    Add to Reading List

    Source URL: all.net

    Language: English - Date: 2009-08-26 18:08:03
      UPDATE