Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners
<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid&g...
Main Authors: | Gregory H. Carlton, Reginald Worthley |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2010-03-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/12 |
Similar Items
-
A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks
by: Gregory H. Carlton
Published: (2007-03-01) -
An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh
by: Gregory H. Carlton
Published: (2008-09-01) -
DNS in Computer Forensics
by: Neil Fowler Wright
Published: (2012-06-01) -
Computer networks forensics
by: Ratomir Đ. Đokić, et al.
Published: (2013-02-01) -
Research in computer forensics
by: Wai, Hor Cheong
Published: (2012)