Anti-computer forensics

Results: 41



#Item
31Digital forensics / Outsourcing / Cloud computing security / Computer security / Forensic science / Network forensics / Cloud storage / Service-level agreement / Anti-computer forensics / Computing / Cloud computing / Centralized computing

Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies Josiah Dykstra, Alan T. Sherman Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County {dykstra, sherman}

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-15 21:10:15
32Information technology management / Information technology audit / Disk encryption / Password / Computer forensics / Information security / Anti-computer forensics / Data security / Security / Computer security

Forensics and other information security considerations in E-Discovery Shaun Gatherum

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-06-19 11:57:53
33Computer forensics / Digital forensics / Malware / Forensic disk controller / Anti-computer forensics / Rootkit / Network forensics / Mobile device forensics / EnCase / Computer security / System software / Computing

C O U R S E C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2013-09-16 10:47:33
34Computer security / Computer forensics / Electronic discovery / Forensic science / Digital evidence / Department of Defense Cyber Crime Center / Anti-computer forensics / Digital forensics / Cybercrime / Law

Microsoft Word - CF4_0807.DOC

Add to Reading List

Source URL: www.craigball.com

Language: English - Date: 2010-12-06 13:06:05
35Cybercrime / Information technology audit / Computing / Anti-computer forensics / Network forensics / Forensic science / Department of Defense Cyber Crime Center / Computational forensics / Digital forensics / Computer forensics / Computer security

Corporate IT Forensics in the New Decade Hong Kong March 2010 Bruce Nikkel

Add to Reading List

Source URL: www.digitalforensics.ch

Language: English - Date: 2010-07-05 04:30:52
36Cybercrime / Computing / Network forensics / The Sleuth Kit / Forensic science / Department of Defense Cyber Crime Center / Anti-computer forensics / Digital forensics / Computer forensics / Computer security

Practical Computer Forensics using Open Source tools Bruce Nikkel June 12, 2008

Add to Reading List

Source URL: www.digitalforensics.ch

Language: English - Date: 2008-06-13 03:45:41
37Steganography tools / Steganalysis / Anti-computer forensics / -graphy / OpenPuff / BPCS-Steganography / Cryptography / Espionage / Steganography

Steganography, Steganalysis, & Cryptanalysis Michael T. Raggo, CISSP Principal Security Consultant VeriSign

Add to Reading List

Source URL: www.spy-hunter.com

Language: English - Date: 2008-01-18 07:06:52
38Steganalysis / Anti-computer forensics / -graphy / Cryptography / Espionage / Steganography

Identifying and Cracking Steganography Programs Session 65 Michael T. Raggo, Sr. Security Consultant, VeriSign CISSP, IAM, CCSA, CCSE, CCSI, SCSA, MCP

Add to Reading List

Source URL: www.spy-hunter.com

Language: English - Date: 2008-01-18 07:06:51
39Cybercrime / Law enforcement / Information technology audit / Forensic science / Anti-computer forensics / Department of Defense Cyber Crime Center / Computer forensics / Digital forensics / Computer security

Digital Forensics: An Introduction An online course presented by the

Add to Reading List

Source URL: www.abchs.com

Language: English
40Steganography tools / Steganalysis / Anti-computer forensics / -graphy / OpenPuff / BPCS-Steganography / Cryptography / Espionage / Steganography

PDF Document

Add to Reading List

Source URL: www.spy-hunter.com

Language: English - Date: 2008-01-18 07:06:53
UPDATE