Good Practice Guide for Computer-Based Electronic Evidence Submitted by rest1 on Wed, 08/27/2025 - 13:13 Read more about Good Practice Guide for Computer-Based Electronic Evidence
Analysing Political Speeches Submitted by rest1 on Wed, 08/27/2025 - 13:12 Read more about Analysing Political Speeches
Hacking democracies: Cataloguing cyber-enabled attacks on elections Submitted by rest1 on Tue, 08/26/2025 - 13:15 Read more about Hacking democracies: Cataloguing cyber-enabled attacks on elections
Dirty work? Policing online indecency in digital forensics Submitted by rest1 on Tue, 08/26/2025 - 13:14 Read more about Dirty work? Policing online indecency in digital forensics
Edward Snowden plea deal with US a possibility, says Eric Holder Submitted by rest1 on Tue, 08/26/2025 - 13:14 Read more about Edward Snowden plea deal with US a possibility, says Eric Holder
Artificial Intelligence and National Security Submitted by rest1 on Tue, 08/26/2025 - 13:14 Read more about Artificial Intelligence and National Security
Cybercrime as a threat to Ukraine’s national security Submitted by rest1 on Tue, 08/26/2025 - 13:14 Read more about Cybercrime as a threat to Ukraine’s national security
Governments are using spyware on citizens Submitted by rest1 on Tue, 08/26/2025 - 13:14 Read more about Governments are using spyware on citizens
Transnational governance of cybersecurity: Policy challenges and global inequalities in cyber capacity building Submitted by rest1 on Tue, 08/26/2025 - 13:14 Read more about Transnational governance of cybersecurity: Policy challenges and global inequalities in cyber capacity building
The Value of Digital Forensics Submitted by rest1 on Tue, 08/26/2025 - 13:14 Read more about The Value of Digital Forensics