4

On the role of file system metadata in digital forensics

Year:
2004
Language:
english
File:
PDF, 182 KB
english, 2004
6

Handed Down in the Family: The Past and Its Uses in the Kan’ei Genealogies of 1643

Year:
2016
Language:
english
File:
PDF, 1019 KB
english, 2016
7

Are computer hacker break-ins ethical?

Year:
1992
Language:
english
File:
PDF, 837 KB
english, 1992
8

Digital government security infrastructure design challenges

Year:
2001
Language:
english
File:
PDF, 244 KB
english, 2001
9

Shell Coiling in Gastropods: Analysis by Stereographic Projection

Year:
1989
Language:
english
File:
PDF, 685 KB
english, 1989
12

Understanding insiders: An analysis of risk-taking behavior

Year:
2013
Language:
english
File:
PDF, 228 KB
english, 2013
16

What *is* information security?

Year:
2004
Language:
english
File:
PDF, 104 KB
english, 2004
24

Software forensics: Can we track code to its authors?

Year:
1993
Language:
english
File:
PDF, 1007 KB
english, 1993
26

Authorship analysis: identifying the author of a program

Year:
1997
Language:
english
File:
PDF, 2.09 MB
english, 1997
28

Creative values of conflict

Year:
1951
Language:
english
File:
PDF, 278 KB
english, 1951
32

A 'best' mismatched filter response for radar clutter discrimination

Year:
1968
Language:
english
File:
PDF, 887 KB
english, 1968
33

Optimum radar signal processing in clutter

Year:
1968
Language:
english
File:
PDF, 1.49 MB
english, 1968
34

Reverse-safe authentication protocol for secure USB memories

Year:
2012
Language:
english
File:
PDF, 7.01 MB
english, 2012
41

Security models for web-based applications

Year:
2001
Language:
english
File:
PDF, 108 KB
english, 2001
46

Kinematics of Accretionary Shell Growth, with Examples from Brachiopods and Molluscs

Year:
1989
Language:
english
File:
PDF, 1.82 MB
english, 1989
48

Mill's Majority Principle

Year:
1985
Language:
english
File:
PDF, 1.01 MB
english, 1985