Author:Veerasamy, Namosha; Grobler, M; Von Solms, BDate:Jul 2012Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, ...Read more
Author:Lessing, M; Von Solms, BDate:Sep 2008The development of live forensic acquisition in general presents a remedy for some of the problems introduced by traditional forensic acquisition. However, this live forensic acquisition introduces a variety of additional problems, unique to ...Read more