Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case
暂无分享,去创建一个
[1] Dc Washington. National Institute of Justice. , 2010 .
[2] T. Schneider. David v. Goliath: The Hong Kong Courts and China's National People's Congress Standing Committee , 2002 .
[3] K. P. Chow,et al. A Host-Based Approach to BotNet Investigation? , 2009, ICDF2C.
[4] Christopher L. T. Brown. Computer Evidence: Collection and Preservation , 2009 .
[5] F. Sapio,et al. The 2012 Revision of the Chinese Criminal Procedure Law: (Mostly) Old Wine in New Bottles , 2014 .
[6] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[7] Ricci S. C. Ieong,et al. FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..
[8] Eoghan Casey,et al. Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition , 2011 .
[9] R. Jones,et al. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 2003, Int. J. Law Inf. Technol..