TITLE

Proposing a Digital Forensics Grange

AUTHOR(S)
Doherty, Eamon; Liebesfeld, Joel
PUB. DATE
May 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;May2008, Vol. 45 Issue 5, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the investigative hardware and software released by the developers of computer forensic tools. The makers outlay significant assets for many of their innovative developments and upgrade designs of their software and hardware. Private investigator says that they are declining a variety of digital forensic work because the needed tools are very expensive. It suggests that the makers should commensurate changes needed to address the problems.
ACCESSION #
31940042

 

Related Articles

  • CYBER SLEUTHING FOR HOT JOBS.  // USA Today Magazine;Aug2006, Vol. 135 Issue 2735, p14 

    This article reports that computer forensics graduates have been in high demand for jobs with law enforcement since the field first appeared, but that demand is growing even greater as private firms begin recruiting cyber investigators. Marcus K. Rogers, an associate professor who heads the...

  • Measuring Whitespace Patterns as an Indication of Plagiarism. Shay, Ilana; Baer, Nikolaus; Zeidman, Robert // Proceedings of the Conference on Digital Forensics, Security & L;2010, p63 

    There are several different methods of comparing source code from different programs to find copying. Perhaps the most common method is comparing source code statements, comments, strings, identifiers, and instruction sequences. However, there are anecdotes about the use of whitespace patterns...

  • On Integrating Mobile Applications into the Digital Forensic Investigative Process. Tanner, April; Duncan, Soniael // International Journal of Advanced Computer Science & Application;Aug2013, Vol. 4 Issue 8, p56 

    What if a tool existed that allowed digital forensic investigators to create their own apps that would assist them with the evidence identification and collection process at crime scenes? First responders are responsible for ensuring that digital evidence is examined in such a way that the...

  • EnCase Forensic.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2006, p68 

    The article reviews the forensic software EnCase Forensic version 5.0 from Guidance Software.

  • Forensic Toolkit.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2006, p69 

    The article reviews the forensic software Forensic Toolkit 1.61 from AccessData.

  • i2 Analyst's Notebook.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2006, p69 

    The article reviews the forensic software Analyst's Notebook version 6.0.55 from i2.

  • Mandiant First Response.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2006, p71 

    The article reviews the forensic software First Response version 1.1 from Mandiant.

  • NetWitness.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2006, p71 

    The article reviews the forensic software NetWitness version 6.0 from ManTech International.

  • ProDiscover Incident Response.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2006, p72 

    The article reviews the forensic software ProDiscover Incident Response version 4.55 from Technology Pathways.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics