Skip to contents

  1. Pallmer, Michael [Author] ; Beierlein, Thomas [Degree supervisor]; Weger, Andreas [Degree supervisor]

    Forensische Sicherheitsanalyse einer Android Applikation

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Mittweida, 2019

    Saxon Bibliography (Sächsische Bibliografie)

  2. Altheide, Cory [Author]; Carvey, Harlan A. [Author]; Carvey, Harlan [Author] ; Davidson, Ray [Other]

    Digital forensics with open source tools

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Amsterdam; Heidelberg [u.a.]: Elsevier Syngress, 2011

  3. Pogue, Chris [Author]; Altheide, Cory [Author]; Haverkos, Todd [Author]

    UNIX and Linux forensic analysis DVD toolkit

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass,: Syngress, 2008

  4. Craiger, Philip [Editor] ; International Conference on Digital Forensics 3 2007 Orlando, Fla

    Advances in Digital Forensics III : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January 28 - January 31, 2007

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York, NY: Springer, 2007

    Published in: IFIP International Federation for Information Processing, a Springer series in computer science

  5. Gruhn, Michael [Author]; Riess, Christian [Author] ; Dewald, Andreas [Editor]; Freiling, Felix C. [Editor]

    Forensische Informatik - [2. Auflage]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Norderstedt: BoD - Books on Demand, Oktober 2015

  6. Cross, Michael [Author] ; Shinder, Debra Littlejohn [Other]

    Scene of the cybercrime : [covering new devices, applications, laws, and regulations ; conduct bullet-proof digital forensic investigations that will stand up in court! ; acquire and analyze data from cell phones, PDAs, and MP3 players ; implement cybercrime detection techniques] - [2. ed., completely rev.]

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress, c 2008