Digital forensics

Results: 501



#Item
21Next Generation Child Protection for Mobile Social Networking Isis Forensics, a Lancaster University spin out company based in InfoLab21, with the support of the Northwest Regional Development Agency (NWDA) and InfoLab21

Next Generation Child Protection for Mobile Social Networking Isis Forensics, a Lancaster University spin out company based in InfoLab21, with the support of the Northwest Regional Development Agency (NWDA) and InfoLab21

Add to Reading List

Source URL: www.isis-forensics.com

Language: English - Date: 2013-03-01 09:44:40
22MediaClone Market Positioning Vision Statement MediaClone is the leading provider of Mobile Computer Forensic Units - Complete Investigation Platforms for field operations; Secure and Economical Devices for Fast Data Era

MediaClone Market Positioning Vision Statement MediaClone is the leading provider of Mobile Computer Forensic Units - Complete Investigation Platforms for field operations; Secure and Economical Devices for Fast Data Era

Add to Reading List

Source URL: www.media-clone.net

Language: English - Date: 2015-07-31 13:11:05
23The Art of Defiling Defeating Forensic Analysis the grugq Overview 

The Art of Defiling Defeating Forensic Analysis the grugq Overview 

Add to Reading List

Source URL: grugq.github.io

Language: English - Date: 2015-01-27 19:51:39
24ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2012-06-29 08:39:58
25HYPERVISOR MEMORY FORENSICS  Hypervisor Memory Forensics Mariano Graziano and Davide Balzarotti SANS DFIR EU SUMMIT OctoberPrague

HYPERVISOR MEMORY FORENSICS Hypervisor Memory Forensics Mariano Graziano and Davide Balzarotti SANS DFIR EU SUMMIT OctoberPrague

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2013-10-22 14:00:52
    26Navigating Unmountable Media with the Digital Forensics XML
 File System Alex J. Nelson NIST, Computer Security Division CurateGear

    Navigating Unmountable Media with the Digital Forensics XML
 File System Alex J. Nelson NIST, Computer Security Division CurateGear

    Add to Reading List

    Source URL: ils.unc.edu

    Language: English - Date: 2016-01-14 08:18:20
      27Digital Forensics of RAM Images Using VOLIX II Patrick Bock FH Aachen, University of Applied Sciences

      Digital Forensics of RAM Images Using VOLIX II Patrick Bock FH Aachen, University of Applied Sciences

      Add to Reading List

      Source URL: www.imf-conference.org

      Language: English - Date: 2014-05-21 12:58:10
      28SOLUTIONS  Digital Investigation Support Services Expert Guidance for Digital Forensics Investigations Involving Foreign Language

      SOLUTIONS Digital Investigation Support Services Expert Guidance for Digital Forensics Investigations Involving Foreign Language

      Add to Reading List

      Source URL: 1jv37d2ck4sy10rozi23w06t.wpengine.netdna-cdn.com

      Language: English - Date: 2015-07-21 10:08:25
        29W i n d o w s Ti m e R u l e s $ S T D I N F O Windows Forensic Analysis P O S T E R

        W i n d o w s Ti m e R u l e s $ S T D I N F O Windows Forensic Analysis P O S T E R

        Add to Reading List

        Source URL: digital-forensics.sans.org

        Language: English - Date: 2016-02-19 16:43:09
          30Counter-Forensics: Attacking Image Forensics Rainer B¨ohme and Matthias Kirchner P RE - PRINT VERSION . This chapter appears in: c Springer, 2012. H. T. Sencar and N. Memon (eds.): “Digital Image Forensics”,

          Counter-Forensics: Attacking Image Forensics Rainer B¨ohme and Matthias Kirchner P RE - PRINT VERSION . This chapter appears in: c Springer, 2012. H. T. Sencar and N. Memon (eds.): “Digital Image Forensics”,

          Add to Reading List

          Source URL: informationsecurity.uibk.ac.at

          Language: English - Date: 2016-04-12 07:21:29