1 |
Computer forensics methodology and praxisMorrison, Robin Cincinnatis, January 2006 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2006. / Title and description from thesis home page (viewed Jan. 30, 2007). Department of Computer Engineering and Computer Science. Vita. "August 2006." Includes bibliographical references (p. 79-82).
|
2 |
Analýza bezpečnostních vlastností v OS Android / Analysis of Security Properties in OS AndroidHanyáš, Martin January 2014 (has links)
This thesis describes operating system Android and its security aspects. Furthermore, the thesis will focus on the forensics analysis of this operating system. The aim is to create forensics application which allows to get sensitive data as well as to make forensic analysis using established tools, and to create background materials for teaching.
|
3 |
Process forensics the crossroads of checkpointing and intrusion detection /Foster, Mark S. January 2004 (has links)
Thesis (Ph. D.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 97 pages. Includes vita. Includes bibliographical references.
|
Page generated in 0.0709 seconds