Forensic Network

Results: 131



#Item
51Mobile technology / Radio resource management / Videotelephony / Base station subsystem / GSM / Cellular network / Time division multiple access / Mobile phone / Enhanced Data Rates for GSM Evolution / Technology / Mobile telecommunications / Electronic engineering

Forensic Identification of GSM Mobile Phones Jakob Hasse Thomas Gloe dence GmbH

Add to Reading List

Source URL: www.dence.de

Language: English - Date: 2013-06-14 09:19:49
52Computing / Internet standards / Internet protocols / Border Gateway Protocol / Multihoming / Classless Inter-Domain Routing / Computer network / Subnetwork / SQL Slammer / Network architecture / Internet / Routing

Forensic Analysis of Autonomous System Reachability DK Lee, Sue Moon Taesang Choi, Taesoo Jeong Division of Computer Science, KAIST

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2006-07-03 02:34:56
53Cybercrime / Computing / Network forensics / The Sleuth Kit / Forensic science / Department of Defense Cyber Crime Center / Anti-computer forensics / Digital forensics / Computer forensics / Computer security

Practical Computer Forensics using Open Source tools Bruce Nikkel June 12, 2008

Add to Reading List

Source URL: www.ch-open.ch

Language: English - Date: 2011-02-08 02:35:11
54Computer networking / Network forensics / Certified Wireless Network Administrator / Packet capture / Network security / Technology / Data transmission / Department of Defense Cyber Crime Center / Computing / Digital forensics / Wireless networking

Network Forensics Analysis - A New Paradigm in Network Security Phill Shade (Forensic Engineer – Merlion’s Keep Consulting) 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-06-27 14:47:32
55Morris worm / Certified Wireless Network Administrator / Computing / Computer security / Welchia / Computer worms / Blaster / Cyberwarfare

Case Study - Worm’s, Virus’s and Bot’s – Attacking From Within… Phill Shade (Forensic Engineer – Merlion’s Keep Consulting) 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-06-26 19:23:12
56Hacker / Certified Wireless Network Administrator / Network forensics / Cisco Career Certifications / Computing / Wireless networking / Hacking

How Are They Doing That? – “What’s Old is New Again” Phill Shade (Forensic Engineer – Merlion’s Keep Consulting) 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-06-27 14:47:32
57Computer forensics / Digital forensics / Malware / Forensic disk controller / Anti-computer forensics / Rootkit / Network forensics / Mobile device forensics / EnCase / Computer security / System software / Computing

C O U R S E C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-03-14 15:52:44
58Mobile telecommunications / Mobile phones / Information technology audit / Mobile device forensics / Cellebrite / Microsoft Kin / Integrated Digital Enhanced Network / International Mobile Equipment Identity / Subscriber identity module / Technology / Mobile technology / Electronic engineering

Microsoft Word - Mobile Device Forensic Process v3.0.doc

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-05-14 11:39:38
59Computing / System software / Data recovery / Information technology audit / Simson Garfinkel / Year of birth missing / Network forensics / The Sleuth Kit / Forensic Toolkit / Computer forensics / Computer security / Digital forensics

d i g i t a l i n v e s t i g a t i o n[removed]S 6 4 eS 7 3 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2010-07-28 09:43:06
60Computing / System software / Data recovery / Information technology audit / Simson Garfinkel / Year of birth missing / Network forensics / The Sleuth Kit / Forensic Toolkit / Computer forensics / Computer security / Digital forensics

d i g i t a l i n v e s t i g a t i o n[removed]S 6 4 eS 7 3 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2010-07-28 09:43:06
UPDATE