Open Access
SHS Web of Conferences
Volume 7, 2014
ICMETM 2014 - International Conference on Modern Economic Technology and Management
Article Number 02006
Number of page(s) 6
Section Management Science
Published online 20 May 2014
  1. Xu Rongsheng, Wu Haiyan, Liu Baoxu. Computer Forensics Introduction[J]. Computer Engineering and Application, 2001(21):114.
  2. Jiang Ping. Electronic Evidence[M]. Beijing: Tsinghua University Press, 2007.
  3. Huang Jun, Wang Binjun. Probative Value Analysis of Document Evidence[J]. Netinfo Security, 2010(03):34–36.
  4. Li Ziping, Zhou Jianda. The Brief of Plot Serious of Illegal Gain Citizens' Personal Information Crime [J]. Law Review, 2012(5):146–152.
  5. Zhang Yunquan. The Electronic Evidence Forensics and Limits[D]. Beijing: China University of Political Science and Law, 2006(09):45.
  6. Dong Mingrui, Shen Limin Zhao Guangjian. User-oriented Data Integration Model Research[J]. Micro Computer Information, 2010(7):26–28.
  7. Su Zhuo. Integration of Heterogeneous Information Resources in the XML Model of Manufacturing Automation[J]. 2011(02):203–206.