The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town
暂无分享,去创建一个
[1] G. Dhinakar Raj. Intellectual Property Rights - An Overview , 2007 .
[2] George M. Mohay,et al. Computer and Intrusion Forensics , 2003 .
[3] Pablo García-Crovetto Lázaro,et al. Forensic Computing from a Computer Security perspective , 2004 .
[4] Michael Gregg. Certified ethical hacker , 2006 .
[5] M. Herselman,et al. Cyber crime influencing businesses in South Africa , 2004 .
[6] John Fitch,et al. Course notes , 1975, SIGS.
[7] Peter Stephenson. A comprehensive approach to digital incident investigation , 2003, Inf. Secur. Tech. Rep..
[8] Broucek,et al. Forensic Computing Developing a Conceptual Approach in the Era of Information Warfare , 2001 .
[9] Sue Fitzgerald,et al. Computer forensics programs in higher education: a preliminary study , 2005, SIGCSE '05.
[10] Nicole Beebe,et al. A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..
[11] Yin Pan,et al. Forensic course development , 2003, CITC4 '03.
[12] A. Coulthard,et al. Computer viruses: a quantitative analysis , 2002 .
[13] Tony Krone,et al. Hacking Motives: High Tech Crime Brief , 2005 .
[14] N. L. Piquero,et al. Causes and Prevention of Intellectual Property Crime , 2005 .
[15] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[16] Jianyi Lin,et al. Computer crime and security survey , 2002 .
[17] Sue Fitzgerald,et al. Computer forensics programs in higher education: a preliminary study , 2005 .