| 1 | -- | 3 | Mark Pollitt. Forensic Twitter |
| 4 | -- | 0 | Lorie M. Liebrock, Brajendra Panda, Robert L. Hutchinson. Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing |
| 5 | -- | 10 | John H. Riley Jr.. Recycling in Vista® |
| 11 | -- | 22 | Gary C. Kessler, Don A. Haggerty. An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview |
| 23 | -- | 32 | Alfred C. Bogen, David A. Dampier, Rayford B. Vaughn, Donna S. Reese, Edward B. Allen, Jeffrey C. Carver. Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials |
| 33 | -- | 45 | Pawel Zwan, Andrzej Czyzewski. Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger |
| 46 | -- | 61 | Yinghua Guo, Jill Slay. Testing Forensic Copy Function of Computer Forensics Investigation Tools |
| 62 | -- | 63 | Gary C. Kessler. ::::Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility::::. By A. Jones and C. Valli |
| 64 | -- | 66 | Gary C. Kessler. ::::Windows Forensic Analysis DVD Toolkit::::, 2nd edition. By Harlan Carvey |