1 |
Digital forensics curriculum for undergraduate and master graduate studentsSamsuddin, Samsuddin Wira Bin. Tu, Manghui. January 2009 (has links) (PDF)
Thesis (M.S.)--Southern Utah University, 2009. / Title from PDF title page. "Thesis presented to the faculty of the Graduate School of Southern Utah University in partial fulfillment of the requirements for the degree of Master of Science in Forensic Science, Computer Forensics Emphasis." Manghui Tu, Advisor. Includes bibliographical references (p. 83-88).
|
2 |
Investigating computer crimeClark, Franklin. Diliberto, Ken, January 1900 (has links) (PDF)
Includes index.
|
3 |
An automated acquisition system for media exploitationBassi, Steven D. January 2008 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2008. / Thesis Advisor(s): Garfinkel, Simson L. "June 2008." Description based on title screen as viewed on August 28, 2008. Includes bibliographical references (p. 55-56). Also available in print.
|
4 |
Forensic analysis of Window's® virtual memory incorporating the system's page-fileStimson, Jared M. January 2008 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2008. / Thesis Advisor(s): Eagle, Chris S. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 89-90). Also available in print.
|
5 |
An analysis of disc carving techniques /Mikus, Nicholas A. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Christopher S. Eagle. Includes bibliographical references (p. 141-142). Also available online.
|
6 |
Cybercrime Legislation in LesothoMaliehe, Mamotumi 30 July 2014 (has links)
This paper advocates introducing cybercrime legislation in Lesotho. Cybercrime is the hottest issue today. Cybercriminals can commit various illegal activities in cyberspace that few people even know exist. A nightmare scenario would be a hacker breaking into the hospital's computer systems on a fine morning and before doctors can arrive to treat their patients, the malicious hacker modifies patients' files on the hospital's database systems: [S]urgeries slated to be performed on the right leg are now switched to the left leg; recorded blood types are altered from AB-negative to O-positive; warnings for known allergies to medicines such as penicillin are electronically erased from patients' charts; and laboratory records on HIV blood tests results are insidiously switched from negative to positive just before patients are to receive their results. (Marc D Goodman 'Why the police don't care about computer crime' (1997) 10 Harvard Journal of Law and Technology 465 at 466). Although this scenario is possible with current technology, unfortunately Lesotho would be powerless to act for lack of adequate laws to investigate and prosecute this conduct. Lesotho's current criminal laws can hardly be enforced against cybercrime, as they do not clearly prohibit the crime. Therefore, this paper argues that Lesotho must adopt a comprehensive legal structure to deter and prosecute cybercrime. It does this by examining international and national approaches to cybercrime, with a view to providing guidance for an effective framework capable of addressing this 'new' crime. Cybercrime is a major global challenge requiring coordinated international effort. In a networked world no island is an island; cybercrime penetrates all countries because of its ability to cross national boundaries. Further, this paper suggests a model law that is based on the first international treaty which plays a key role in combating cybercrime. Finally, it recognises that legislation alone cannot fight cybercrime; law enforcement must be equipped to implement the law, and private citizens must know about cybercrime and the need to protect themselves and their systems and networks.
|
7 |
Development of a cyber attack simulator for network modeling and cyber security analysis /Costantini, Kevin C. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 155-157).
|
8 |
Is it possible to regulate the Internet globally? a comparative case study of the cybercrime framework in Canada and Romania /Manolescu, Dan S. January 2009 (has links)
Thesis (M.A.) -- University of Alberta, 2009. / "A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Arts in Humanities Computing, University of Alberta." Title from pdf file main screen (viewed on October 8, 2009). Includes bibliographical references.
|
9 |
Cyber crime and telecommunications law /Imhof, Robert. January 2010 (has links)
Typescript. Includes bibliographical references (leaves 218-220).
|
10 |
Unauthorized access crimes /Steh, Stephen. January 2009 (has links)
Thesis (M.S.)--Youngstown State University, 2009. / Includes bibliographical references (leaves 52-54). Also available via the World Wide Web in PDF format.
|
Page generated in 0.049 seconds