Digital Forensics: Operational, Legal, and Research Issues
暂无分享,去创建一个
Mark Pollitt | Sujeet Shenoi | Michael A. Caloyannides | Jon Novotny | Mark Pollitt | S. Shenoi | M. Caloyannides | J. Novotny
[1] H. Marshall Jarrett,et al. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .
[2] K. Inman,et al. Principles and Practice of Criminalistics: The Profession of Forensic Science , 2000 .
[3] James G. McAdams. Foreign Intelligence Surveillance Act (FISA): An Overview , 1969 .
[4] Paul Francis,et al. The IP Network Address Translator (NAT) , 1994, RFC.
[5] Lawrence A. Presley,et al. Recovering and Examining Computer Forensic Evidence , 2000 .
[6] David W. J. Stringer-Calvert,et al. Digital Evidence , 2002, Commun. ACM.
[7] Eric J. Sinrod,et al. Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws , 2000 .
[8] John Hebeler,et al. Peer-to-Peer: Building Secure, Scalable, and Manageable Networks , 2001 .
[9] John D. LaDue. Electronic Surveillance and Conversations in Plain View: Admitting Intercepted Communications Relating to Crimes Not Specified in the Surveillance Order , 1999 .
[10] Stephen Hinde. The law, cybercrime, risk assessment and cyber protection , 2003, Comput. Secur..