Digital forensics

Results: 501



#Item
251Technical analysis / Volatility / Chess endgames / Chess theory / Mathematical finance

Thought-provoking and inspiring Michael Cloppert Chief Research Analyst, Lockheed Martin CIRT The George Washington University

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-18 18:48:37
252Europe / Bitstream Vera / Prague / Geography of Europe

One  Location  to   Rule  Them  All   mac4n6   Artifacts  Location  

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-10-22 12:55:34
253Network protocols / Media Transfer Protocol / Portable media players / Picture Transfer Protocol / USB mass-storage device class / Digital audio players / Universal Serial Bus / Windows Image Acquisition / Windows / Microsoft Windows / Computing / Computer hardware

USB Devices and Media Transfer Protocol Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-06-11 17:22:54
254Operating system / Kernel / Linux / Architecture of Windows NT / Debuggers / Integrated development environments / Computing / Software / Cross-platform software

Rekall Memory Forensics Michael Cohen [removed] What is Rekall? ● An advanced memory analysis solution.

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-10-22 12:55:30
255Computing / MyISAM / Database engine / InnoDB / SQL / MySQL Federated / MySQL / Data management / Software

Forensic Analysis of MySQL DB Systems Marcel Niefindt | SANS DFIR Prague 2014 Prague, [removed] whoami Abstract

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-10-22 12:55:37
256Basketball / ULEB Cup 2004–05 Regular Season Group A

SANS Cyber Threat Intelligence Summit Recent Threat Trend Analysis Scott Montgomery VP, CTO Public Sector [removed]

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-18 18:51:46
257

Calendar — Month — [removed]to[removed]

Add to Reading List

Source URL: digital-forensics.sans.org

- Date: 2014-06-11 17:23:00
    258Internet-related prefixes / Prefixes

    THE DOLLARS AND “SENSE” BEHIND THREAT INTELLIGENCE SHARING[removed] © Cyber Squared Inc[removed]

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-02-18 18:53:34
    259Computer security / Cybercrime / Electronic warfare / Hacking / Computer crimes / Malware / Threat / Attack / Phishing / Computer network security / Cyberwarfare / Security

    CYBER4SIGHT THREAT INTELLIGENCE SERVICES Brochure

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-02-21 10:53:51
    260Security / Evasion / Firewall / Rootkit / Intrusion prevention system / Honeypot / Computer network security / Computer security / Cyberwarfare

    Agile Defensive Technologies IOC Bucket, LLC Agenda  Anatomy of the Attack  Defense in Depth Capabilities

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-02-18 18:41:54
    UPDATE