نتایج جستجو برای: computer operating procedure

تعداد نتایج: 1282898  

Journal: :Digital Investigation 2004
Brian D. Carrier Joe Grand

The acquisition of volatile memory from a compromised computer is difficult to perform reliably because the acquisition procedure should not rely on untrusted code, such as the operating system or applications executing on top of it. In this paper, we present a procedure for acquiring volatile memory using a hardware expansion card that can copy memory to an external storage device. The card is...

Journal: :IEEE Transactions on Biomedical Engineering 2010

Journal: :Journal of the American College of Cardiology 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید