NTFS

Results: 562



#Item
31Jim	
  Lyle	
   National	
  Institute	
  of	
  Standards	
  and	
  Technology	
   Disclaimer	
   	
  Certain	
  trade	
  names	
  and	
  company	
  products	
  are	
   mentioned	
  in	
  the	
  text

Jim  Lyle   National  Institute  of  Standards  and  Technology   Disclaimer    Certain  trade  names  and  company  products  are   mentioned  in  the  text

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2010-09-16 15:17:26
32Better I/O Through Byte-Addressable, Persistent Memory Jeremy Condit Edmund B. Nightingale  Microsoft Research

Better I/O Through Byte-Addressable, Persistent Memory Jeremy Condit Edmund B. Nightingale Microsoft Research

Add to Reading List

Source URL: www.frostnet.net

Language: English - Date: 2009-08-07 23:55:37
33CalvinFS: Consistent WAN Replication and Scalable Metadata Management for Distributed File Systems Alexander Thomson, Google; Daniel J. Abadi, Yale University https://www.usenix.org/conference/fast15/technical-sessions/p

CalvinFS: Consistent WAN Replication and Scalable Metadata Management for Distributed File Systems Alexander Thomson, Google; Daniel J. Abadi, Yale University https://www.usenix.org/conference/fast15/technical-sessions/p

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-06-09 14:15:37
34The KudOS Architecture for File Systems Andrew de los Reyes, Chris Frost, Eddie Kohler, Mike Mammarella, and Lei Zhang University of California, Los Angeles {adlr,frost,kohler,mikem,leiz}@cs.ucla.edu I NTRODUCTION

The KudOS Architecture for File Systems Andrew de los Reyes, Chris Frost, Eddie Kohler, Mike Mammarella, and Lei Zhang University of California, Los Angeles {adlr,frost,kohler,mikem,leiz}@cs.ucla.edu I NTRODUCTION

Add to Reading List

Source URL: featherstitch.cs.ucla.edu

Language: English - Date: 2007-09-10 19:53:30
35Implementing BitLocker Drive Encryption for Forensic Analysis∗ Jesse D. Kornblum, ManTech International Corporation  Abstract

Implementing BitLocker Drive Encryption for Forensic Analysis∗ Jesse D. Kornblum, ManTech International Corporation Abstract

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-02-04 11:20:57
36

PDF Document

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2000-12-10 09:50:18
37

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:46
38Microsoft Word - NIRMS2.doc

Microsoft Word - NIRMS2.doc

Add to Reading List

Source URL: www.proni.gov.uk

Language: English - Date: 2008-08-21 06:17:57
39830  CASE STUDY 2: WINDOWS 2000 CHAP. 11

830 CASE STUDY 2: WINDOWS 2000 CHAP. 11

Add to Reading List

Source URL: www.cs.vu.nl

Language: English
40DFE – Digital Forensics Essentials Foundation Level Course Objectives This 2 day class is designed to provide a foundation for a digital forensic examiner, eDiscovery specialist, or first responder. Lessons presented w

DFE – Digital Forensics Essentials Foundation Level Course Objectives This 2 day class is designed to provide a foundation for a digital forensic examiner, eDiscovery specialist, or first responder. Lessons presented w

Add to Reading List

Source URL: www.digitalintelligence.com

Language: English - Date: 2011-04-21 10:37:43