Digital forensics

Results: 501



#Item
141Computer memory / Digital forensics / Information technology audit / Computer forensics / Acquisition

Helix3 Pro Live Forensics 1-Day Online Course Syllabus This course provides students with the knowledge and skills necessary to begin a computer-based investigation using Helix3 Pro. Students will hear lectures regarding

Add to Reading List

Source URL: www.e-fense.com

Language: English - Date: 2010-09-10 12:55:19
142Digital forensics / Evidence / Law / Electronic discovery / Crime / Science / Outline of forensic science / Forensic corporate collections / Criminology / Forensic science / Heuristics

Nigerian Institute of Advanced Legal Studies Nigeria’s law abode OVERVIEW OF DIGITAL FORENSIC ADVOCACY Digital forensics is used in both criminal and private investigations. It is associated with criminal law, where ev

Add to Reading List

Source URL: nials-nigeria.org

Language: English - Date: 2014-10-03 11:01:21
143Computing / Technology / Intel / Deconstruction / Critical theory

SANS Cyber Threat Intelligence Summit[removed]Feb 2nd, 2015

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
144Palaeography / Writing / Information / Data / Copyright / Cohen / Science / Diplomatics / Document forgery / Historiography

A Tale of Two Traces Archives, Diplomatics, and Digital Forensics[removed]Orlando, FL Dr. Fred Cohen

Add to Reading List

Source URL: all.net

Language: English - Date: 2015-01-22 10:15:12
145Network architecture / Computing / Internet standards / Whois / Domain name / Name server / Computer network security / DNS hijacking / Google Public DNS / Domain name system / Internet / Internet protocols

DNS as a Control Point for Cyber Risk DR . PAU L V I X I E February 3, 2015 FARSIGHT SECURITY, INC. - COMPANY CONFIDENTIAL © 2015

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
146Cyberwarfare / Computer network security / Security / Penetration test / Hacker / Vulnerability / White hat / Exploit / Security testing / Software testing / Hacking / Computer security

Incorporating Cyber Threat Intelligence into Security Assessment

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:11
147Apple Inc. / Computing / Industrial designs / Digital audio players / IPod software / IPod / HFS Plus / Forensic Toolkit / File system / ITunes / Software / Portable media players

Running head: iPod Forensics

Add to Reading List

Source URL: www.utica.edu

Language: English - Date: 2006-01-10 09:11:58
148Knowledge / Historiography / Diplomatics / Document forgery / Writing / Questioned document examination / Records management / Internet Archive / Wayback Machine / Archival science / Science / Library science

A Tale of Two Traces – Archives, Diplomatics, and Digital Forensics Fred Cohen – CEO – Management Analytics Abstract—This paper focuses on two examples of legal matters involving archived data, one a digital arch

Add to Reading List

Source URL: all.net

Language: English - Date: 2015-01-22 10:05:11
149Open-source intelligence / Web development / Mashup / Computing / Kodama / World Wide Web / Web 2.0 / Collective intelligence

Maltego Kung-Fu Exploiting Open Source Threat Intelligence Matt Kodama VP Product [removed]

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
150Intelligence analysis / Research methods / Data collection / Intelligence / Military intelligence / Analysis of Competing Hypotheses / Analysis / Statistical hypothesis testing / Hypothesis / Science / Statistics / Scientific method

Analysis of Competing Hypotheses An Analytical Process by former CIA analyst Richards J Heuer, Jr. What is analysis?

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:09
UPDATE