Showing
1 - 8
results of
8
for search '
Brian Cusack
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Brian Cusack
Showing
1 - 8
results of
8
for search '
Brian Cusack
'
, query time: 0.10s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Can compression reduce forensic image time?
by
Brian
Cusack
,
Jon Pearse
Get full text
Article
2
Comparing the performance of three digital forensic tools
by
Brian
Cusack
,
James Liang
Get full text
Article
3
Evidential recovery from GPS devices
by
Brian
Cusack
,
Mark Simms
Get full text
Article
4
Digital forensics: What's in a programme?
by
Brian
Cusack
,
Krassie Petrova
Get full text
Article
5
Acquiring digital evidence from Botnet attacks: procedures and methods
by
Junewon, Park
Published 2011
Other Authors:
“
...
Brian
,
Cusack
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Others
6
Online buying behavior in Saudi Arabia and New Zealand: a comparative case study
by
Alsuwat, Mohammed Owaidh
Published 2013
Other Authors:
“
...
Brian
,
Cusack
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Others
7
Steganographic techniques on social media: investigation guidelines
by
Chee, Aimie
Published 2013
Other Authors:
“
...
Brian
,
Cusack
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Others
8
Assessing Network Intrusion Detection System performance: forensic implications
by
Alqahtani, Muteb
Published 2013
Other Authors:
“
...
Brian
,
Cusack
...
”
Call Number:
Loading...
Located:
Loading...
Get fulltext
Others
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Botnet
Digital Forensics
E-commerce
Factors
Honeynet
Honeypot
IT forensics
Image steganography
Investigation guideline
Malware
Online customers
Online shopping
Online social networking forensic
Saudi Arabia
Steganography forensic investigation
intrusion detection systems
Loading...