Journal: Inf. Sec. Techn. Report

Volume 8, Issue 2

5 -- 0Chez Ciechanowicz. Introduction
6 -- 17. Forensic analysis on a Lotus Notes server
18 -- 31. Addressing the data problem
32 -- 36. Computer forensics: past, present and future
37 -- 41. Some stepping stones in computer forensics
42 -- 54. A comprehensive approach to digital incident investigation
55 -- 64. Management strategies for implementing forensic security measures