<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://repositorio.unirn.edu.br/jspui/handle/123456789/730">
    <title>Repositório Colecção:</title>
    <link>http://repositorio.unirn.edu.br/jspui/handle/123456789/730</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://repositorio.unirn.edu.br/jspui/handle/123456789/731" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-28T05:48:14Z</dc:date>
  </channel>
  <item rdf:about="http://repositorio.unirn.edu.br/jspui/handle/123456789/731">
    <title>Computação forense e suas ferramentas de investigação criminal</title>
    <link>http://repositorio.unirn.edu.br/jspui/handle/123456789/731</link>
    <description>Título: Computação forense e suas ferramentas de investigação criminal
Resumo: In this article we will talk about forensic computing, what it is, what are its tools &#xD;
and its methods that are used in computer experts. In thesis, forensic &#xD;
computing is the science that comprises the acquisition, prevention, recovery &#xD;
and analysis of computational evidence, data that have been electronically &#xD;
processed and stored in files. This article was based on the study of forensic &#xD;
computing. To acquire the necessary knowledge to elaborate the project, the &#xD;
subjects about forensic computation, its legal implications, how to acquire, &#xD;
preserve, analyze and present the data of an investigation were studied. About &#xD;
the analysis of evidence of a cyber-crime, its concepts, characteristics, &#xD;
mechanisms, security policies and forms of protection. In each step, it was &#xD;
described in detail and presented through flowcharts for better understanding. &#xD;
At the end of this article we will be able to give you a certain notion of the &#xD;
important role of this subject in the technologically developed society. We will &#xD;
know the real value of the subject, since every day the human being is strongly &#xD;
linked to technology, which besides bringing several benefits, such as &#xD;
connection, automation among others, also brings the bad side of becoming a &#xD;
target of virtual crimes.
Type: Trabalho de Conclusão de Curso</description>
    <dc:date>2020-01-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

