Digital forensics

Results: 501



#Item
201Scripting languages / Pattern matching / Grep / AWK / Sed / Find / Uniq / Newline / Nl / Computing / Software / Unix

Microsoft Word - NETWORK FORENSICS CHEAT SHEET 1.0-1

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-03-21 11:17:18
202

Modern Incident Response Jeffrey J. Guy | 9 Jun 14 [removed] @jjguy ©2014 Bit9. All Rights Reserved

Add to Reading List

Source URL: digital-forensics.sans.org

- Date: 2014-06-11 17:23:10
    203Mobile telecommunications / Mobile phones / Information technology audit / Mobile device forensics / Cellebrite / Microsoft Kin / Integrated Digital Enhanced Network / International Mobile Equipment Identity / Subscriber identity module / Technology / Mobile technology / Electronic engineering

    Microsoft Word - Mobile Device Forensic Process v3.0.doc

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-05-14 11:39:38
    204

    Calendar — Month — [removed]to[removed]

    Add to Reading List

    Source URL: digital-forensics.sans.org

    - Date: 2014-06-11 17:23:00
      205OSI protocols / Phishing / BlackBerry / MIME / Email / Computing / Internet

      TARGETED CAMPAIGN ANALYSIS AND TRACKING ARE YOU AT THE TIP OF THE SPEAR OR THE BACK OF THE BUS? Christopher Witter, Sr. Strategic Intrusion Analyst

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-06-11 17:22:52
      206VMware / Firewall / System software / Software / Computer network security / Computing / VMDK

      To Silo, or Not to Silo: That is the Question Frank McClain, GCFA, GCIH, CHFI InfoSec Manager, CSIRT Lead PrimeLending, A PlainsCapital Company

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-06-11 17:22:46
      207

      The Application Onion Peeling away the mystery, exposing the data Lee Reiber, VP Mobile Forensic Solutions, AccessData Today’s Trends

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-06-11 17:23:04
        208Computing / Technology / Password / BlackBerry Tour / BlackBerry Enterprise Server / BlackBerry / Software / Smartphones

        Blackberry Forensics SANS DFIR Summit 2014 – Austin TX June-9-14 Copyright © QuByte Logic Ltd

        Add to Reading List

        Source URL: digital-forensics.sans.org

        Language: English - Date: 2014-06-11 17:23:17
        209Computing / Oracle Corporation / JavaScript / Oracle Database / Password / Tuvalu / Tokelau / Software / Cross-platform software / Polynesia

        Closing the Door on Web Shells Anuj Soni 1 <%if(request.getParameter("f")!=null)(new

        Add to Reading List

        Source URL: digital-forensics.sans.org

        Language: English - Date: 2014-06-11 17:23:20
        210Intelligence analysis / Research methods / Data collection / Intelligence / Military intelligence / Analysis of Competing Hypotheses / Analysis / Statistical hypothesis testing / Hypothesis / Science / Statistics / Scientific method

        Analysis of Competing Hypotheses An Analytical Process by former CIA analyst Richards J Heuer, Jr. What is analysis?

        Add to Reading List

        Source URL: digital-forensics.sans.org

        Language: English - Date: 2015-02-06 11:01:09
        UPDATE