Skip to main content

SUU Digital Library

Add or remove other collections to your search:



Narrow your search by:



You've searched: All Collections

  • All fields: Kessler
(6 results)



Display: 20

    • Page 20

    •  
    • 14 Note: This figure is adapted from “Computer Forensics Education” by Yasinsac, A., Erbacher F. R., Marks G. D., Pollitt M. M. & Sommer M. P. (2003). IEEE Security & Privacy, 1(4), 15-23. ªComputer Network Forensics. According to this model, we...
    • Page 53

    •  
    • 47 appropriate mix of instruction and scholarly activity” [Wes07]. Additionally, the lecturer also must have all the criteria as recommended by Digital Forensics Certification Board (DFCB). It is a natural vendor organization that certifies a...
    • Page 91

    •  
    • 85 [FOW(n.d.)] http://www.forensicswiki.org/wiki/Main_Page [Gen(n.d.)] http://ghr.nlm.nih.gov/handbook/basics/dna [Got(n.d.)] Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S. & Stein, M. Computer Forensics Programs in Higher Education: A...
    • Page 47

    •  
    • NON-VERBAL COMMUNICATION IN INSTANT MESSAGING 48 Campbell, S. W. & Park, Y. J. (2008). Teaching and learning guild for social implications of mobile telephony: The rise of personal communication society. Sociology Compass, 2(6), 2030-2040. Canary,...
    • Page 46

    •  
    • Girls and Relational Aggression 42 Sparks, S., (2011) Study finds academic payoffs in teaching students social skills. Education Week, 30 (20). Young, E., Nelsen, D., Hottle, A., Warburton, B., & Young, B., (2011). Relational agression among...

QuickView

Display a larger image and more item information when the pointer pauses over a thumbnail
 

Layout options:

Select the collections to add or remove from your search
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
 
OK
Select the collections to add or remove from your search
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
 
OK