Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii May 2006

Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii

Thomas Lyons (Thom) Carr III Appl.Sc., CEM

A Project for a Professional Degree submitted to The Faculty of School of Engineering and Applied Science of The George Washington University in partial fulfillment of the requirements for the degree of Applied Scientist of Engineering Management May 21, 2006

On October 10, 2000, The Disaster Mitigation Act of 2000 (DMA 2000 or DMA 2K) (Public Law 106-390) was enacted, amending the Robert T. Stafford Relief and Emergency Assistance Act and established new requirements for the national for hazard mitigation planning. States, Tribes, territories, and local governments now must have an approved mitigation plan in place prior to receiving certain …


Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott Apr 2006

Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott

George H Baker

The rise of the American homeland security endeavor under the leadership of the new Department of Homeland Security has been heralded by several major national strategy documents. These documents have served to organize efforts at top levels within the government and industry. However, the national strategy guidance is not getting to many organizations and people at the grass-roots level who can make the most difference in preventing attacks, protecting systems, and recovering from catastrophic events, viz. the general citizenry, private infrastructure owners, and local governments. To better understand grass-roots issues and solutions, James Madison University, in cooperation with the Federal …


Biochemical Characterization Of The Major Sorghum Grain Peroxidase, Mamoudou H. Dicko, Harry Gruppen, Riet Hilhorst, Alphons G. J. Voragen, Willen W. H. Van Berkel Apr 2006

Biochemical Characterization Of The Major Sorghum Grain Peroxidase, Mamoudou H. Dicko, Harry Gruppen, Riet Hilhorst, Alphons G. J. Voragen, Willen W. H. Van Berkel

Pr. Mamoudou H. DICKO, PhD

The major cationic peroxidase in sorghum grain (SPC4) , which is ubiquitously present in all sorghum varieties was purified to apparent homogeneity, and found to be a highly basic protein (pI #1;11). MS analysis showed that SPC4 consists of two glycoforms with molecular masses of 34227 and 35629 Da and it contains a type-b heme. Chemical deglycosylation allowed to estimate sugar contents of 3.0% and 6.7% (w ⁄ w) in glycoform I and II, respectively, and a mass of the apoprotein of 33 246 Da. High performance anion exchange chromatography allowed to determine the carbohydrate constituents of the polysaccharide chains. …


Mac Os X Forensics, Philip Craiger, Paul Burke Dec 2005

Mac Os X Forensics, Philip Craiger, Paul Burke

J. Philip Craiger, Ph.D.

This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.


Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger Dec 2005

Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger

J. Philip Craiger, Ph.D.

Secure deletion programs purport to permanently erase files from digital media. These programs are used by businesses and individuals to remove sensitive information from media, and by criminals to remove evidence of the tools or fruits of illegal activities. This paper focuses on the trace evidence left by secure deletion programs. In particular, five Windows-based secure deletion programs are tested to determine if they leave identifiable signatures after deleting a file. The results show that the majority of the programs leave identifiable signatures. Moreover, some of the programs do not completely erase file metadata, which enables forensic investigators to extract …