search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(91)
Keywords
« Previous
1
...
3
4
5
6
7
8
9
10
23%
New approaches for forensics in cloud environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
by a malicious third-party? In this context, the term data provenance [
6
] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
« Previous
1
...
3
4
5
6
7
8
9
10