Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse
暂无分享,去创建一个
Paul Turner | Vlasti Broucek | Sandra Frings | Mathew Hannan | M. Hannan | S. Frings | Paul Turner | Vlasti Broucek
[1] Rasool Azari,et al. Current Security Management & Ethical Issues of Information Technology , 2003 .
[2] Rodney McKemmish,et al. What is forensic computing , 1999 .
[3] Paul Turner,et al. Australian Forensic Computing Investigation Teams: Research on Competence , 2003, PACIS.
[4] V. Broucek,et al. Bridging the Divide : Rising Awareness of Forensic Issues amongst Systems Administrators , 2002 .
[5] Paul Turner,et al. Beyond the matrix: Research on competence among Australian forensic computing investigation teams , 2003 .
[6] Paul Turner,et al. A forensic computing perspective on the need for improved user education for information systems security management , 2002 .
[7] Broucek,et al. Forensic Computing Developing a Conceptual Approach in the Era of Information Warfare , 2001 .