您要查找的是不是:
- computer forensics technology 计算机取证技术
- Computer forensics system based on data mining technology is researched. 本文对基于数据挖掘技术的计算机取证系统进行了探讨。
- Computer forensics and enterprise security II. 电脑鉴识与企业安全2。
- DataExpert Technology Ltd. - Provides services in data security, data recovery, data erasure, computer forensics, degausser, degaussing and mobile phone recovery. 韩新数据恢复(香港)有限公司-提供储存媒体的数据恢复服务。
- In computer forensics's data recovery and convention data recovery, it has used the same principle, but it has its own some characteristic request and the technology realizes the method. 摘要计算机取证中的数据恢复与常规数据恢复虽然利用了相同的原理,但是有其自身的一些特点要求及技术实现方法。
- Study of computer dynamic forensics technology 计算机动态取证技术的研究
- In order to solve data recovery problems in computer forensics,this paper proposes a new algorithm based on NTFS. 为解决计算机取证的数据恢复问题;提出了一种基于新技术文件系统(New technology file system;NTFS)的数据恢复算法.
- Computer Forensics in the fight against computer crime and network in a very critical role. 计算机取证在打击计算机和网络犯罪中作用十分关键.
- But acquiring this kind of evidence, that is computer forensics, is a big problem to us. 但对于这类证据的取得,即计算机犯罪取证,却是人们要面对的一个难题。
- In fact, with thousands of investigations under our belt, we cover the entire spectrum of computer forensics and digital crime. 事实上,通过在我们的地带进行上千次的调查研究,我们已经掌握了所有电脑取证和数字犯罪的特征。
- In order to fetch evidences effectively and insure their originality and validity, a new method for dynamic computer forensics is presented. 实验表明,该模型能有效地对多种攻击进行实时证据的提取,具有自适应性、分布性、实时性等优点,是动态计算机取证的一个较好解决方案。
- Log files analysis is the important contain of system security inspect, and log files is the primarily evidence of computer forensics. 日志文件分析是系统安全检测的重要内容;同时日志文件也是计算机取证的重要依据。
- The computer forensics can take the following steps: protect and investigate crime scene;determine and obtain electronic evidence;analyze and take data;file and submit result. 计算机取证可按以下步骤进行:保护和勘查现场、确定和获取电子证据、分析和提取数据、归档并提交结果。
- In the paper, an effective acquring technique of dynamic digital evidence based on intrusion detection is proposed, which incorporates intrusion detection and computer forensics. 本文将入侵检测技术结合到计算机取证技术中,提出一个基于入侵检测技术的动态证据识别与获取方法。
- The news routinely reports the solution of a cold case, a suspect excluded or a wrongful conviction overturned through advanced forensic technology. 新闻中经常出现毫无头绪的旧案水落石出、疑人改列非嫌疑人、冤昭雪等故事,都是先进鑑识技术的功劳。
- Evidences used for computer forensics are usually distributed in heterogeneous event logs.Fusing heterogeneous event logs into scenarios is meaningful for aiding computer forensics. 摘要计算机取证牵涉的证据通常分布在多种不同的日志中,从多源日志进行事件场景关联对于辅助取证意义重大。
- The Centre*s work encompasses all aspects of informationtechnology and law, including computerisation of legal information on the Internet, intellectual property and computer forensics. 中心的工作包括信息技术与法律领域的研究,包括互联网合法信息的计算机化,知识产权与计算机实验室。
- I'd like to borrow a book a book on computer technology. 我想借一本计算机技术方面的书。
- Hard copy is computer output on paper, printing or graphics. 硬拷贝是出现在纸上、印刷上或图表上的电脑输出。
- The computer has a normal qwerty keyboard. 这台计算机有标准的英文键盘。