Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Revista Virtual Universidad Católica del Norte
Animal Research International
INMATEH - Agricultural Engineering
Scientific Journal of Silesian University of Technology. Series Transport



Register Journal



Visitors Counter

TodayToday
623
YesterdayYesterday
1698
This weekThis week
7577
Last WeekLast week
11700
This monthThis month
28575
Last monthLast month
50787
All daysAll days
5855648

Journal of Digital Forensics, Security and Law

Number 4, 2007

  • 9-18
    SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams
    Authors: Douglas P. Twitchell
    Number of views: 337
  • 19-42
    Education Organization Baseline Control Protection and Trusted Level Security
    Authors: Wasim A. Al-Hamdani
    Number of views: 330
  • 43-58
    Making Molehills Out of Mountains: Bringing Security Research to the Classroom
    Authors: Richard G. Taylor
    Number of views: 321
  • 59-76
    The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise
    Authors: Guillermo Francia III, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
    Number of views: 357
  • 77-106
    Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Authors: Errol A. Blake
    Number of views: 337

Number 3, 2007

  • 7-28
    An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity
    Authors: Stephen D. Barnes, David P. Biros
    Number of views: 307
  • 29-44
    Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective
    Authors: Ki Jung Lee, Il- Yeol Song
    Number of views: 309
  • 45-56
    Providing a Foundation for Analysis of Volatile Data Stores
    Authors: Timothy Vidas
    Number of views: 308
  • 57-60
    Book Review: Computer Forensics: Principles and Practices
    Authors: Jigang Liu
    Number of views: 334

Number 2, 2007

  • 7-22
    Computer Crimes: A Case Study of What Malaysia Can Learn from Others?
    Authors: Janaletchumi Appudurai, Chitra Latha Ramalingam
    Number of views: 402
  • 23-40
    Monitoring and Surveillance in the Workplace: Lessons Learnt? Investigating the International Legal Position
    Authors: Verine Etsebeth
    Number of views: 317
  • 41-56
    The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism
    Authors: Murdoch Watney
    Number of views: 335
  • 57-66
    Information Technology Act 2000 in India - Authentication of E-Documents
    Authors: R. G. Pawar, B. S. Sawant, A. Kaiwade
    Number of views: 304
  • 67-70
    Book Review: Conquest in Cyberspace: National Security and Information Warfare
    Authors: Gary C. Kessler
    Number of views: 308

Number 1, 2007

  • 9-34
    The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research
    Authors: Kenneth J. Knapp, F. Nelson Ford, Thomas E. Marshall, R. Kelly Rainer, Jr.
    Number of views: 459
  • 35-56
    A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks
    Authors: Gregory H. Carlton
    Number of views: 357
  • 57-74
    Information Governance: A Model for Security in Medical Practice
    Authors: Patricia A.H. Williams
    Number of views: 270
  • 75-92
    Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence
    Authors: Nikica Budimir, Jill Slay
    Number of views: 292
  • 93-96
    Book Review: No Place To Hide
    Authors: Gary Kessler
    Number of views: 306

Number 4, 2006

  • 9-28
    A Curriculum for Teaching Information Technology Investigative Techniques for Auditors
    Authors: Grover S. Kearns
    Number of views: 305
  • 29-48
    The Role of Power and Negotiation in Online Deception
    Authors: Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
    Number of views: 324
  • 49-66
    Is Forensic Computing a Profession? Revisiting an Old Debate in a New Field
    Authors: Bernd Carsten Stahl
    Number of views: 307
  • 67-70
    Book Review: Digital Crime and Forensic Science in Cyberspace
    Authors: Gary C. Kessler
    Number of views: 331


 В начало  Предыдущая страница  2 3 4 5 6 7  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us