Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
Publications
"Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies."
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Publications
This document is Dr. Kessler's review of Conquest in Cyberspace: National Security and Information Warfare, by Martin C. Libicki. Cambridge University Press, 2007. ISBN 978-0-521-69214-4
Book Review: No Place To Hide, Gary C. Kessler
Book Review: No Place To Hide, Gary C. Kessler
Publications
This document is Dr. Kessler's review of No Place to Hide, by Robert O'Harrow, Jr. Free Press, 2006. ISBN 0-7432-8705-3.