Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer forensics
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Further reading== * A Practice Guide to Computer Forensics, First Edition (Paperback) by David Benton (Author), Frank Grindstaff (Author) * {{cite journal |last=Casey |first=Eoghan |author2=Stellatos, Gerasimos J. |year=2008 |title=The impact of full disk encryption on digital forensics |journal=Operating Systems Review |volume=42 |issue=3 |pages=93β98 |doi=10.1145/1368506.1368519 |citeseerx=10.1.1.178.3917 |s2cid=5793873 }} * {{cite journal |url=http://pages.cs.wisc.edu/~huangyz/cvpr08_Huang.pdf |title=Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model |author1=YiZhen Huang |author2=YangJing Long |journal=Proc. IEEE Conference on Computer Vision and Pattern Recognition |year=2008 |pages=1β8 |access-date=2009-12-18 |archive-url=https://web.archive.org/web/20100617081150/http://pages.cs.wisc.edu/~huangyz/cvpr08_Huang.pdf |archive-date=2010-06-17 |url-status=dead }} * Incident Response and Computer Forensics, Second Edition (Paperback) by Chris Prosise (Author), Kevin Mandia (Author), Matt Pepe (Author) "Truth is stranger than fiction..." (more) * {{cite book |author1=Ross, S. |author2=Gow, A. | year = 1999| isbn = 978-1-900508-51-3 | title = Digital archaeology? Rescuing Neglected or Damaged Data Resources | url = http://www.ukoln.ac.uk/services/elib/papers/supporting/pdf/p2.pdf | publisher = British Library and Joint Information Systems Committee | location = Bristol & London }} * {{cite book|title=Computer and intrusion forensics|year=2003|publisher=Artech House|isbn=978-1-58053-369-0|page=395|url=https://books.google.com/books?id=z4GLgpwsYrkC|author=George M. Mohay}} * {{cite book|title=System Forensics, Investigation, and Response|year=2013|publisher=Jones & Bartlett|isbn=978-1284031058|page=318|url=http://www.jblearning.com/catalog/9780763791346/|author=Chuck Easttom|access-date=2013-09-23|archive-url=https://web.archive.org/web/20130614163726/http://www.jblearning.com/catalog/9780763791346/|archive-date=2013-06-14|url-status=dead|author-link=Chuck Easttom}} ===Related journals=== * ''IEEE Transactions on Information Forensics and Security'' * ''Journal of Digital Forensics, Security and Law'' * ''International Journal of Digital Crime and Forensics'' * ''Journal of Digital Investigation'' * ''International Journal of Digital Evidence'' * ''International Journal of Forensic Computer Science'' * ''Journal of Digital Forensic Practice'' * ''Cryptologia'' * ''Small Scale Digital Device Forensic Journal'' {{Digital forensics}} {{Authority control}} {{DEFAULTSORT:Computer Forensics}} [[Category:Computer forensics| ]] [[Category:Computer security procedures]] [[Category:Information technology audit]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)