•  
  •  
 

Table of Contents

Front Matter/Back Matter

Articles

PDF

Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers
Asawaree Kulkarni, James Goldman, Brad Nabholz, and William Eyre

PDF

Correlating Orphaned Windows Registry Data Structures
Damir Kahvedžić and Tahar Kechadi

PDF

Bluetooth Hacking: A Case Study
Dennis Browning and Gary C. Kessler

PDF

The Impact of Hard Disk Firmware Steganography on Computer Forensics
Iain Sutherland, Gareth Davies, Nick Pringle, and Andrew Blyth