Digital forensics

Results: 501



#Item
111Cyberwarfare / Computer network security / Data security / Penetration test / Vulnerability / Application security / Information security / Risk / Information technology security audit / Software testing / Security / Computer security

What is on your mind, is on your body Nikhil Wagholikar Practice Lead | Security Assessments & Digital Forensics Member, Mumbai OWASP Chapter

Add to Reading List

Source URL: www.clubhack.com

Language: English - Date: 2009-12-20 12:31:52
112Digital evidence / Forensic science / Crime / Law / Criminal law / Digital forensics / Computer forensics / Information technology audit

Join us for a FREE webinar entitled "Cyber Forensics" on April 6, 2015, 1:00 to 2:00 pm (EST). Register for the event now: https://www.eventbrite.com/e/webinar-cyber-forensics-ticketsThis webinar covering Cy

Add to Reading List

Source URL: www.wifle.org

Language: English - Date: 2015-03-31 06:50:49
113Crime / Vidocq Society / Richard Walter / Frank Bender / Offender profiling / Forensic science / Private investigator / Digital forensics / Computer forensics / Law enforcement / Criminal investigation / Law

PDF Document

Add to Reading List

Source URL: www.vidocq.org

Language: English - Date: 2015-01-16 22:17:00
114Computer network security / Cybercrime / Cyberwarfare / Malware / Anti-computer forensics / Threat / Department of Defense Cyber Crime Center / Computer forensics / Computer security / Digital forensics

training.keywcorp.com This two-week course teaches students to perform the fast and efficient digital forensics required to discover and investigate an Advanced Persistent Threat. Students learn the types of tactics and

Add to Reading List

Source URL: training.keywcorp.com

Language: English - Date: 2015-02-20 11:19:54
115Computing / System software / Anti-computer forensics / Digital forensics / Rootkit / Memory-mapped file / Data remanence / Computer virus / Paging / Computer security / Virtual memory / Computer forensics

Physical Memory Forensics Mariusz Burdach Overview • •

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
116Econometrics / Estimation theory / Statistical theory / Steganalysis / Digital watermarking / Jessica Fridrich / JPEG / Regression analysis / Cross-validation / Statistics / Cryptography / Steganography

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRILFrom Blind to Quantitative Steganalysis Tomáš Pevný, Jessica Fridrich, Member, IEEE, and Andrew D. Ker, Member, IEEE

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2012-04-21 10:14:54
117Imaging / Digital camera / Camera phone / Red Digital Cinema Camera Company / Digital single-lens reflex camera / Image noise / Camera / Statistical classification / Digital photography / Image processing / Optics

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBERBlind Identification of Source Cell-Phone Model Oya Çeliktutan, Bülent Sankur, Senior Member, IEEE, and ˙Ismail Avcibas¸, Me

Add to Reading List

Source URL: www.busim.ee.boun.edu.tr

Language: English - Date: 2009-01-19 10:35:12
118Law enforcement / Police / Public safety / Surveillance / Law / Cyberwarfare / Law enforcement in Japan / National security / Security / Crime prevention

1. Police InfoCommunications A. Analysis of Computer Systems and Electromagnetic Records (1) Digital Forensics The High-Tech Crime Technology Division with the Digital Forensic

Add to Reading List

Source URL: www.npa.go.jp

Language: English
119Data / Markup languages / Simson Garfinkel / Year of birth missing / Computer file formats / Filesystem in Userspace / XML / File system / Metadata / Computing / Technical communication / Information

Enumerating and Analyzing Storage Data with Digital Forensics XML Alex Nelson Prometheus Computing, LLC ! University of California, Santa Cruz

Add to Reading List

Source URL: ils.unc.edu

Language: English - Date: 2015-01-12 08:26:14
120Science / Forensic science / Penetration test / Forensic disk controller / Disk encryption / Anti-computer forensics / Department of Defense Cyber Crime Center / Digital forensics / Cybercrime / Computer security

Hostile Forensics by: Mark Lachniet Version 1.0, August 5, 2011 Table of Contents 1. Overview...............................................................................................................................

Add to Reading List

Source URL: lachniet.com

Language: English - Date: 2011-08-05 22:44:24
UPDATE