acm-header
Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Editorial pointers

Editorial Pointers


DEPARTMENT: News track

News Track


DEPARTMENT: Forum

Forum


COLUMN: Technical opinion

Video Image Stabilization and Registration Technology

A powerful software algorithm is utilized for a variety of video-enhancing applications.
COLUMN: International perspectives

Computing in Post-War Afghanistan

Reflecting on recent history and the context of current events.
COLUMN: Legally speaking

Regulating Technical Design

Should software developers be required to include infringement-inhibitingcomponents such as filters in their technologies?
COLUMN: Technology strategy and management

Where Does Russia Fit Into the Global Software Industry?

Exploring how Russia's nascent software industry measures up to other countries.
COLUMN: Viewpoint

Who Should Govern the Internet?

Failing to share control, the U.S. risks driving disaffected countries to establish their own competing, independent root servers, thus creating parallel Internets.
DEPARTMENT: Hot links

Top 10 Downloads from ACM's Digital Library


COLUMN: President's letter

Offshoring: Finally Facts vs. Folklore

The ACM Job Migration study was released last month, and it includes many recommendations for current and future computing professionals and educators.
SPECIAL ISSUE: Next-generation cyber forensics

Introduction


Investigating Sophisticated Security Breaches

Sophisticated intruders take full advantage of the lack of forensic readiness. To respond more effectively to such attacks, computer security professionals and digital investigators must combine talents and work together.

Risks of Live Digital Forensic Analysis

Live analysis tools have made a significant difference in capturing evidence during forensic investigations. Such tools, however, are far from infallible.

Live Forensics: Diagnosing Your System Without Killing It First

Live forensics gathers data from running systems, providing additional contextual information that is not available in a disk-only forensic analysis.

Standardizing Digital Evidence Storage


Digital Evidence Bag


Improving the Computer Forensic Analysis Process Through Visualization

The ability to display mountains of data in a graphical manner significantly enhances the time needed to locate and analyze suspicious files.

Next-Generation Digital Forensics

The digital forensics community requires new tools and strategies for the rapid turnaround of large forensic targets.

State and Local Law Enforcement Is Not Ready For a Cyber Katrina


AFF: A New Format For Storing Hard Drive Images


The Metadata Enigma

Metadata promises too much value as a business management tool to dismiss its implementation and maintenance effort as the equivalent of Sisyphean torture.

The Present B2C Implementation Framework

It guides e-commerce firms implementing B2C Web sites intended to attract customers, earn their trust, and entice them to buy while helping integrate the firms' internal business processes.

Wireless Commons Perils in the Common Good

In the last few years, high-speed wireless access to the Internet has grown rapidly. Surprisingly, this growth has not come through cellular phone networks as many had expected, but through IEEE 802.11 standards-based wireless …
DEPARTMENT: Student de-charter notice

Student De-Charter Notice


Principles For Digital Preservation

Focusing on end users' needs rather than those of archiving institutions.

Protocol Analysis: A Neglected Practice

Protocol analysis is an evidence-gathering technique with an established record in experimental psychology. Here, it is applied to study how programmers solve problems.

The Quarks of Object-Oriented Development

A two-construct taxonomy is used to define the essential elements of object orientation through analysis of existing literature.

Making Computer Science Minority-Friendly

Computer science programs neglect diverse student needs.
COLUMN: Inside risks

Trustworthy Systems Revisited