Last Updated on 24 Jan. 2013, Total: 6 White Papers

  1. Federal Guidelines for Searching and Seizing Computers

  2. Presentation: Investigating and Prosecuting Network Intrusions

  3. Will a trunk-mounted radio damage computer evidence?

  4. Secure Audit Logs to Support Computer Forensics

  5. Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs

  6. Software Forensics: Can We Track Code to its Authors?

Featured Links