IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Research IRM InfoSci-OnDemand Powered Search

Search terms:  


Search Reset Total results: 1230
Full text: Title:
Keyword: Author/editor:
ISBN/ISSN: DOI:
Content:
Search Reset
Term Exclude Inflectional Weight
Add New Term
Search Reset
Keywords:  
Search Reset
Subject:  
Search Reset
Sort by:
rank
Book Chapter
Designing a Forensic-Enabling Cloud Ecosystem
Keyun Ruan (2013). Cybercrime and Cloud Forensics: Applications for Investigation Processes 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Evidentiary Implications of Potential Security Weaknesses in Forensic Software
Chris K. Ridder (2011). New Technologies for Digital Crime and Forensics: Devices, Applications, and Software 11 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Designing a Forensic-Enabling Cloud Ecosystem
Keyun Ruan (2015). Cloud Technology: Concepts, Methodologies, Tools, and Applications 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
Evidentiary Implications of Potential Security Weaknesses in Forensic Software
Chris K. Ridder (2009). International Journal of Digital Crime and Forensics 12 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot
Ifeyinwa Eucharia Achumba, Kennedy Chinedu Okafor, Gloria N. Ezeh, Uchenna Hermes Diala (2015). International Journal of Digital Crime and Forensics 22 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Tracing Cyber Crimes with a Privacy-Enabled Forensic Profiling System
Pallavi Kahai, Kamesh Namuduri, Ravi Pense (2008). Information Security and Ethics: Concepts, Methodologies, Tools, and Applications 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Tracing Cyber Crimes with a Privacy-Enabled Forensic Profiling System
Pallavi Kahai, Kamesh Namuduri, Ravi Pense (2006). Digital Crime and Forensic Science in Cyberspace 18 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols
Qi Wei, Ahmed Patel (2009). International Journal of Mobile Computing and Multimedia Communications 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Digital Evidence
Richard Boddington (2011). Digital Business Security Development: Management Technologies 36 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Biometrical Processing of Faces in Security and Forensics
Pawel T. Puslecki (2010). Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions 25 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Survey of Cloud Computing Challenges from a Digital Forensics Perspective
Gregory H. Carlton, Hill Zhou (2011). International Journal of Interdisciplinary Telecommunications and Networking 16 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Survey of Cloud Computing Challenges from a Digital Forensics Perspective
Gregory H. Carlton, Hill Zhou (2012). Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications 16 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Survey of Cloud Computing Challenges from a Digital Forensics Perspective
Gregory H. Carlton, Hill Zhou (2013). Advancements and Innovations in Wireless Communications and Network Technologies 16 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols
Qi Wei, Ahmed Patel (2011). Innovations in Mobile Multimedia Communications and Applications: New Technologies 19 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Watch What You Wear: Smartwatches and Sluggish Security
Joseph Ricci, Ibrahim Baggili, Frank Breitinger (2017). Managing Security Issues and the Hidden Dangers of Wearable Technologies 27 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Forensic Investigative Process for Situational Awareness in Information Security
Khidir Mohamed Ali, Thomas Owens (2012). Situational Awareness in Computer Network Defense: Principles, Methods and Applications 13 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Cloud Crime and Fraud: A Study of Challenges for Cloud Security and Forensics
Nimisha Singh (2016). Combating Security Breaches and Criminal Activity in the Digital Sphere 17 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
The ‘Cloud’ of Unknowing – What a Government Cloud May and May Not Offer: A Practitioner Perspective
Mick Phythian (2013). International Journal of Technoethics 10 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Comprehensive Survey of Event Analytics
T. Gidwani, M. J. Argano, W. Yan, F. Issa (2012). International Journal of Digital Crime and Forensics 14 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Comprehensive Survey of Event Analytics
T. Gidwani, M. J. Argano, W. Yan, F. Issa (2013). Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security 15 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
A Forensic Computing Perspective on the Need for Improved User Education for Information Systems Security Management
Vlasti Broucek, Paul Turner (2003). Current Security Management & Ethical Issues of Information Technology 8 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Security of Mobile Devices for Multimedia Applications
Goran Pulkkis, Kaj Grahn, Jonny Karlsson, Nhat Dai Tran (2008). Multimedia Technologies: Concepts, Methodologies, Tools, and Applications 45 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Security of Mobile Devices for Multimedia Applications
Goran Pulkkis, Kaj J. Grahn, Jonny Karlsson, Nhat Dai Tran (2008). Mobile Multimedia Communications: Concepts, Applications, and Challenges 49 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Book Chapter
Forensics as a Service
Jon Rav Gagan Shende (2013). Cybercrime and Cloud Forensics: Applications for Investigation Processes 25 pages.
View Details View Details PDF Full Text View Sample PDF
rank
Journal Article
A Review of Current Research in Network Forensic Analysis
Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan (2013). International Journal of Digital Crime and Forensics 26 pages.
View Details View Details PDF Full Text View Sample PDF
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last 
InfoSci-OnDemand Powered Search
Body Bottom