Upper Saddle River,NJ: Pearson Prentice Hall. Holt, T.J. (2009b). The Attack Dynamics ofPolitical and Religiously Motivated Hackers. InT. Saadawi & L. Jordan (eds) Cyber Infrastructure Protection (pp. 161¥182).
The program was designed to create profiles of the Internet use of every public person online using various pieces of data that could be surreptitiously collected (Gallagher, 2015). It began in earnest in 2009 through the use of ...
... Anthony detectives overlooked Google search. Retrieved March 19, 2014 from www.bigstory.ap.org Baier, H. (2011/2012). On the use of hash functions in computer forensics. Retrieved from https://www.fbi.h-da.de Barrios, R. M., ...
"Types of hardware, peripherals, and electronic evidence"--"Evidence integrity"--"Summary" -- "13 ACQUISITION AND EXAMINATION OF FORENSIC EVIDENCE" -- "Introduction" -- "Data preservation" -- "Digital forensic imaging tools" -- "Uncovering ...
Cyber bullying: Protecting kids and adults from online bullies. ABC-CLIO. Mit ell, K. J., Finkelhor, D., & Be er-Blease, K. A. (2007). Linking youth internet and conventional problems: Findings from a clinical perspective.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA.