Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Computer forensics

Articles 1 - 4 of 4

Full-Text Articles in Information Security

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler Mar 2016

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler

Gary C. Kessler

This document is Dr. Kessler's review of Challenges to Digital Forensic Evidence, by Fred Cohen. Fred Cohen & Associates, 2008. ISBN 1-878109-41-3


Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler Mar 2016

Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler

Gary C. Kessler

This document is Dr. Kessler's review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3.


Book Review: Digital Forensic Evidence Examination, Gary C. Kessler Mar 2016

Book Review: Digital Forensic Evidence Examination, Gary C. Kessler

Gary C. Kessler

This document is Dr. Kessler's review of the second edition of Digital Forensic Evidence Examination by Fred Cohen. ASP Press, 2010. ISBN: 978-1-878109-45-3


A Study Of Wireless Security Privacy And Forensics, Demetrios Roubos, Shawn Casler, James Hedigan, Ryan Shaw, Ajantha Herath, Suvineetha Herath, David D. Costantino, Vincent Cicirello, Robert L. Kachur Dec 2007

A Study Of Wireless Security Privacy And Forensics, Demetrios Roubos, Shawn Casler, James Hedigan, Ryan Shaw, Ajantha Herath, Suvineetha Herath, David D. Costantino, Vincent Cicirello, Robert L. Kachur

David D Costantino

Wireless networking has become an extremely common household technology in a matter of only a few years. Concerns for privacy have become more relevant than ever, with more cases of identity and data theft occurring everyday. Initially, consumer grade wireless technology was distributed without security being a major concern. Today, almost every consumer grade wireless router comes with either “out-of-the-box” encryption or with relatively easy to follow instructions on how to properly secure the household wireless infrastructure. In this paper we investigate wireless technology and the implications related to the privacy of the average user.