Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Gregory H. Carlton"'
Autor:
Gregory H. Carlton
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 8, Iss 1, Pp 17-38 (2013)
Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expe
Externí odkaz:
https://doaj.org/article/894e63b9f9124273a5af1734e7c4179d
Autor:
Gregory H. Carlton, Gary C Kessler
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 7, Iss 2, Pp 113-142 (2012)
One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as
Externí odkaz:
https://doaj.org/article/198e6ccb8cee44d1bb4c124ed3c20646
Autor:
Gregory H. Carlton, Joe Matsumoto
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 6, Iss 3, Pp 63-74 (2011)
As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contem
Externí odkaz:
https://doaj.org/article/8b9539b1813a43e78b4402ac2029cc77
Autor:
Gregory H. Carlton, Reginald Worthley
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 5, Iss 1, Pp 5-20 (2010)
The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly
Externí odkaz:
https://doaj.org/article/9e4340487963454eb54b6d2767ead2a5
Autor:
Gregory H. Carlton
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 3, Iss 3, Pp 43-60 (2008)
The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments,
Externí odkaz:
https://doaj.org/article/71cc7295f6ca4f2cb5b9a60674054f3c
Autor:
Gregory H. Carlton
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 2, Iss 1, Pp 35-56 (2007)
As a relatively new field of study, little empirical research has been conducted pertaining to computer forensics. This lack of empirical research contributes to problems for practitioners and academics alike.For the community of practitioners, pro
Externí odkaz:
https://doaj.org/article/e36c9c79123b4ff9999bc8e0c7a7b949
Autor:
Gregory H. Carlton, Gary C. Kessler
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 10:62-65
The study and practice of forensic science comprises many distinct areas that range from behavioral to biological to physical and to digital matters, and in each area forensic science is utilized to obtain evidence that will be admissible within the
Autor:
Gary C. Kessler, Gregory H. Carlton
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 10:55-61
Best practices in digital forensics include a procedure to sanitize media on which forensic images will be stored, thus eliminating potential challenges that contamination of the evidence may occur due to data that exist on the media prior to storing
Autor:
Gary C. Kessler, Gregory H. Carlton
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 9:1-9
Digital forensic methodology deviates significantly relative to the methods of other forensic sciences for numerous practical reasons, and it has been largely influenced by factors derived from the inception and evolution of this relatively new and r
Autor:
Gary C. Kessler, Gregory H. Carlton
Digital forensic methodology deviates significantly relative to the methods of other forensic sciences for numerous practical reasons, and it has been largely influenced by factors derived from the inception and evolution of this relatively new and r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::031be70743564d37c72be4833d578103
https://doi.org/10.4018/978-1-7998-2466-4.ch076
https://doi.org/10.4018/978-1-7998-2466-4.ch076