Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
233
YesterdayYesterday
2118
This weekThis week
9759
Last WeekLast week
13850
This monthThis month
6254
Last monthLast month
50787
All daysAll days
5833327

Journal of Digital Forensics, Security and Law

Number 4, 2009

  • 7-42
    Online Child Sexual Abuse: The French Response
    Authors: Mohamed Chawki
    Number of views: 328
  • 43-50
    A Synopsis of Proposed Data Protection Legislation in SA
    Authors: Francis S Cronjé
    Number of views: 324
  • 51-72
    Prevention is Better than Prosecution: Deepening the Defence against Cyber Crime
    Authors: Jacqueline Fick
    Number of views: 323
  • 73-94
    Telecommunications Liberalisation in Africa: Proposed Regulatory Model for the SADC Region
    Authors: Z. Ntozintle Jobodwana
    Number of views: 311

Number 3, 2009

  • 5-16
    Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective
    Authors: Craig Valli, Patryk Szewczyk
    Number of views: 360
  • 17-34
    Electronic Forms-Based Computing for Evidentiary Analysis
    Authors: Andy Luse, Brian Mennecke, Anthony M. Townsend
    Number of views: 278
  • 35-56
    To License or Not to License Revisited: An Examination of State Statutes Regarding Private Investigators and Digital Examiners
    Authors: Thomas Lonardo, Doug White, Alan Rea
    Number of views: 324
  • 57-60
    Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
    Authors: Gary Kessler
    Number of views: 338

Number 2, 2009

  • 5-26
    Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers
    Authors: Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre
    Number of views: 323
  • 27-38
    Visualisation of Honeypot Data Using Graphviz and Afterglow
    Authors: Craig Valli
    Number of views: 342
  • 39-56
    Correlating Orphaned Windows Registry Data Structures
    Authors: Damir Kahved, Tahar Kechadi
    Number of views: 325
  • 57-72
    Bluetooth Hacking: A Case Study
    Authors: Dennis Browning, Gary C. Kessler
    Number of views: 358
  • 73-84
    The Impact of Hard Disk Firmware Steganography on Computer Forensics
    Authors: Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth
    Number of views: 323

Number 1, 2009

  • 5-38
    Graduate Accounting Students' Perception of IT Forensics: A Multi-Dimensional Analysis
    Authors: Grover S. Kearns
    Number of views: 329
  • 39-60
    Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis
    Authors: Peter J. Best, Pall Rikhardsson, Mark Toleman
    Number of views: 310
  • 61-80
    Defining a Forensic Audit
    Authors: Stevenson G. Smith, Larry D. Crumbley
    Number of views: 415


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us