@inbook{RID:0814170417397-26,
title = {Mobile Forensics using the Harmonised Digital Forensic Investigation Process},
chapter = {},
pages = {},
publisher = {},
year = {2014},
author = {Mumba, Emilio Raymond and Venter, H. S.},
editor = {},
booktitle = {2014 Information Security For South Africa (Issa)}
}
2014
Mobile forensics using the harmonised digital forensic investigation process
@article{Venter2014,title = {Mobile forensics using the harmonised digital forensic investigation process},journal = {2014 Information Security for South Africa - Proceedings of the ISSA 2014 Conference},year = {2014},author = {Mumba, E.R. and Venter, H.S.}}
2014
Models for the forensic monitoring of cloud virtual machines
@article{Venter2014,title = {Models for the forensic monitoring of cloud virtual machines},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2014},volume = {2014-January},pages = {290-299},author = {Ras, D. and Venter, H.}}
2014
Proceedings of the ISSA 2014 Conference 13-14 August 2014 Radisson Blu Gautrain Hotel Sandton Johannesburg South Africa Introduction
@inbook{RID:0814170417398-29,
title = {Proceedings of the ISSA 2014 Conference 13-14 August 2014 Radisson Blu Gautrain Hotel Sandton Johannesburg South Africa Introduction},
chapter = {},
pages = {},
publisher = {},
year = {2014},
author = {Venter, Hein and Loock, Marianne and Coetzee, Marijke and Eloff, Mariki},
editor = {},
booktitle = {2014 Information Security For South Africa (Issa)}
}
2014
Requirements for preparing the cloud to become ready for digital forensic investigation
@article{Venter2014,title = {Requirements for preparing the cloud to become ready for digital forensic investigation},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2014},volume = {2014-January},pages = {242-250},author = {Dlamini, M. and Venter, H. and Eloff, J. and Eloff, M.}}