Digital Forensic Investigation of Virtual Desktop Infrastructure

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing virtual desktop infrastructure with NetScaler

Learn how NetScaler delivers business-critical security capabilities to advance the many benefits of virtual desktops

متن کامل

Virtual Desktop Infrastructure (VDI) Technology: FI4VDI Project

This paper presents an analysis of the FI4VDI project, the goal of which was to develop an innovative model of service provision using cloud computing in order to create an infrastructure suite aimed at large companies and SMEs alike, educational institutions, universities and/or research centers that would contribute to competitiveness and provide an efficient solution to reducing the carbon f...

متن کامل

Digital forensic investigation of cloud storage services

The demand for cloud computing is increasing because of the popularity of digital devices and the wide use of the Internet. Among cloud computing services, most consumers use cloud storage services that provide mass storage. This is because these services give them various additional functions as well as storage. It is easy to access cloud storage services using smartphones. With increasing uti...

متن کامل

Mapping Process of Digital Forensic Investigation Framework

Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic investigation to be performed successfu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology

سال: 2013

ISSN: 1598-3986

DOI: 10.13089/jkiisc.2013.23.2.203