Journal of Digital Forensic Practice

Title Publication Date Language Citations
Heuristic Security-Testing Methods2006/03/01English
Open Source Tools for Phishing Investigations2006/09/01English
Message from the Editor2007/06/22English
Byte/Counterbyte2007/06/22English
A Review of: “Real Digital Forensics: Computer Security and Incident Response. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose”2007/06/22English
Trends2006/03/01English
A Simple Image Hiding Technique: What You May Be Missing2008/05/27English
Blue Skies and Storm Clouds2008/05/27English
Editorial2008/12/09English
Auditing Hash Sets: Lessons Learned fromJurassic Park2008/12/09English
Managing Expectations2008/12/09English
Software Forensics. By Robert Slade2008/12/09English
Issues and Techniques for Redacting PDF Files2008/12/09English
A Study of Current Trends in Database Forensics2010/12/15English
Identification of Legal Issues for Computer Forensics2010/12/15English
Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business2010/12/15English
Computer Printouts as Legal Evidence2010/12/15English
myKarve: JPEG Image and Thumbnail Carver2010/12/15English
Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing2010/03/18English
Windows Forensic Analysis DVD Toolkit, 2nd edition. By Harlan Carvey2010/03/18English
Testing Forensic Copy Function of Computer Forensics Investigation Tools2010/03/18English
Recycling in Vista®2010/03/18English
Forensic Twitter2010/03/18English
Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility. By A. Jones and C. Valli2010/03/18English
Incorporating Accountability into Internet E-mail2009/09/09English
The Good, the Bad, the Unaddressed2009/09/09English
Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques2009/09/09English
The National Consumers League's Call for Action2006/07/01English
Using XML to Support Robust Information Sharing: An IODEF Automated Approach2006/07/01English
PhishScope: Tracking Phish Server Clusters2006/07/01English