Network security: private communication in a public world
Network security: private communication in a public world
Counter hack: a step-by-step guide to computer attacks and effective defenses
Counter hack: a step-by-step guide to computer attacks and effective defenses
Computer forensics: incident response essentials
Computer forensics: incident response essentials
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom
Halting the Hacker
Intrusion Detection with SNORT (Bruce Perens' Open Source Series): Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID
CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
Incident Response & Computer Forensics, 2nd Ed.
Incident Response & Computer Forensics, 2nd Ed.
Incident response: a strategic guide to handling system and network security breaches
Incident response: a strategic guide to handling system and network security breaches
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Game-based forensics course for first year students
Proceedings of the 13th annual conference on Information technology education
Hi-index | 0.00 |
In a paper presented in 2003, Forensic Course Development, the authors described the procedures and rationale used for the development of an undergraduate and a graduate computer and network forensic course at Rochester Institute of Technology (RIT). After the undergraduate course was taught in the spring quarter of 2003, the contents of the lecture and lab materials, outcomes of the course, and student feedback were reviewed. This feedback will help improve both the instructional materials and their delivery. This paper's focus is on the development of the computer and network forensic course, as well as the changes made during the review process to improve the computer and network forensic course.