Introduction to Computer Forensics
Lectures 2 - 6: Introduction to Criminal Justice
Introduction to Criminal Justice Part 1
Introduction to Criminal Justice Part 2
Introduction to Criminal Justice Part 3
The seven objectives from "The Challenge of Crime in a Free Society" that would shape criminal justice for some time.
What is Inofrmation? What is Computer?
History of Computing Links
A History of the
Computer from PBS
Computer History Images
An Illustrated History of Computers
Computer History
Museum Ehibits
The History Chanel Video Gallery
Timeline of Computing History
The History of Computing by
Michelle A. Hoyle
History of
computing hardware from Wikipedia
History of
Computing, Virginia Montecino Education and Technology Resources
Intel 4004
Lectures 8 - 13
Gulliver's Travels by
Jonathan Swift
Gulliver's Travels by
Jonathan Swift
Gulliver's Travel (1939)
Big Endian, Little
Endian
Big
Endian, Little
Endian from Wikipedia
Introduction to Computer Ethics, text: Ethics
in Information Technology, George Reynolds
Introduction to Computer Ethics: Privacy, text: Ethics
in Information Technology, George Reynolds
Computer Ethics Web
Resourcs
History of
Cryptography Web Resources
Introduction to Cryptology
Cryptology Material
Niels Provos and Peter
Honeyman, Hide and Seek: AnIntroduction to Steganography, IEEE Security &
Privacy Magazine, May/June
2003.
HUAIQING WANG AND SHUOZHONG WANG, Cyber Warfare: Steganography vs.
Steganalysis, COMMUNICATIONS OF THE ACM October 2004/Vol. 47, No. 10
MP3Stego
Hide4PGP
picture 1
picture 2
Binary-Decimal-Binary
Converter
National
Cyber Security Division
Cyber
Security: Make it a Habit
U.S.
Department of Homeland Security, CERT Form Partnership
Gabriel Weimann
Cyberterrorism: How Real Is the Threat?"
Steganography and Cyber Terrorism Communications, Dancho Danchev
An Overview of
Steganography for the Computer Forensics Examiner, Gary C. Kessler
Laptops lead to
Al Qaeda plot
August 03, 2004 Rediff.com
U.S. gets
new cyberterrorism security center, Computerworld, April 21, 2005
EMERGING TECHNOLOGIES
FOR HOMELAND SECURITY, John Yen
Robert Popp, Thomas Armour, Ted Senator, Kristen Numrych, Countering terrorism through information
technology