Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 16
11.
  • Protecting Your Files Protecting Your Files
    Windows® 10 Anniversary Update Bible, 04/2017
    Book Chapter

    This chapter explains how to back up both user's personal files and system files. It discusses System Protection, which creates restore points to keep copies of some files around temporarily. This ...
Celotno besedilo
Dostopno za: UPUK
12.
  • The impact of Microsoft's W... The impact of Microsoft's Windows 7 on computer forensics examinations
    Hayes, Darren; Reddy, Vijay; Qureshi, Shareq 2010 IEEE Long Island Systems, Applications and Technology Conference
    Conference Proceeding

    Windows 7 is a new operating system and, like any new technical environment, it has notable implications for computer forensics examiners. The impact of this new operating system will not be as ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
13.
  • The Analysis of Security We... The Analysis of Security Weakness in BitLocker Technology
    Jiang Yi-ming; Liu Sheng-li 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010-April, Letnik: 1
    Conference Proceeding

    BitLocker technology uses Trusted Platform Module (TPM) to build the trust chain of system booting to protect the integrity of the system components from destruction. This technology can prevent the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
14.
  • Defense technology of anti ... Defense technology of anti forensic
    Suhyung Jo; Dowon Hong 2008 International Conference on Control, Automation and Systems, 2008-Oct.
    Conference Proceeding

    An anti-forensic is the technology which it collects witness data which are disadvantageous for a self among data stored in the computer or the mobile equipment or doesnpsilat analyze and obstructs a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
15.
  • A framework for computer fo... A framework for computer forensics investigations involving Microsoft Vista
    Hayes, D.R.; Qureshi, S. 2008 IEEE Long Island Systems, Applications and Technology Conference
    Conference Proceeding

    The technical environment continues to change and impact the work of digital investigations. This research provides a framework within which computer forensics investigators can take advantage of new ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
16.
  • Configuring Folder Security... Configuring Folder Security, Access, and Replication
    Windows Server® 2008 R2 Administration, 01/2010
    Book Chapter

    This Chapter contains sections titled: Implement Permissions Share Folders Configure Offline File Caching Secure Folders and Files Implement the Distributed File System
Celotno besedilo
Dostopno za: UPUK
1 2
zadetkov: 16

Nalaganje filtrov