Results 41 to 50 of about 13,424 (50)

Alarm systems and their use in municipalities [PDF]

open access: yesKošická bezpečnostná revue, 2018
Currently, there is no literature in Slovakia that contains basic security and safety topics in municipalities. Mayors in municipalities are often in the role of security managers without real competencies. They have to solve security problems, but there
Filip LENKO, Andrej VEĽAS
doaj  

Penerapan Unsur Tindak Pidana Aborsi Oleh Penyidik Berdasarkan Alat Bukti Yang Digunakan

open access: yesUnes Journal of Swara Justisia
Sanksi pidana terhadap wanita yang menggugurkan kandungannya tercantum pada Pasal 75 ayat (1) Undang-Undang Nomor 36 Tahun 2009 Tentang Kesehatan. Penelitian ini merupakan penelitian hukum dengan spesifikasi yang bersifat deskriptif analitis.
Joko Hendro Lesmono, Fitriati
doaj   +1 more source

Advanced forensic bioimaging analysis: The radiomics perspective

open access: yesForensic Science International: Reports, 2021
Fabio De-Giorgio, Luca Boldrini
doaj   +1 more source

A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients

open access: yesJournal of Digital Forensics, Security and Law, 2006
Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation.
Kim Morfitt, Craig Valli
doaj  

The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market

open access: yesJournal of Digital Forensics, Security and Law, 2008
All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers ...
Andy Jones   +3 more
doaj  

Forensic Analysis of the Windows 7 Registry

open access: yesJournal of Digital Forensics, Security and Law, 2010
The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth.
Khawla Abdulla Alghafli   +2 more
doaj  

Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic

open access: yesJournal of Digital Forensics, Security and Law, 2014
The Siemens S7 protocol is commonly used in SCADA systems for communications between a Human Machine Interface (HMI) and the Programmable Logic Controllers (PLCs).
Amit Kleinmann, Avishai Wool
doaj  

When Bad Things Happen Inside Crime Labs

open access: yesForensic Science International: Synergy, 2021
John Byrd
doaj   +1 more source

Leading Outward

open access: yesForensic Science International: Synergy, 2021
Cameron Cozzens
doaj   +1 more source

Assessment of Secondary Trauma, Burnout, and Job Satisfaction of Forensic Professionals

open access: yesForensic Science International: Synergy, 2021
Andrew Levin
doaj   +1 more source

Home - About - Disclaimer - Privacy