Forensics

Results: 1448



#Item
101Computing / Computer hardware / Computer data storage / Digital forensics / Computer storage media / Non-volatile memory / Solid-state drive / Data erasure / Forensic disk controller / Computer security / Forensic science / Forensic search

MediaClone Market Positioning Vision Statement MediaClone is the leading provider of Mobile Computer Forensic Units - Complete Investigation Platforms for field operations; Secure and Economical Devices for Fast Data Era

Add to Reading List

Source URL: www.media-clone.net

Language: English - Date: 2015-07-31 13:11:05
102Voting / Politics / Cryptography / Elections / Election technology / Electronic voting / Electoral systems / Vote counting / Scantegrity / Punchscan / Optical scan voting system / Ballot

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:38
103Computing / Computer data storage / Computer hardware / Cellebrite / Non-volatile memory / Data management / Computer memory / Mobile device forensics

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics ...............................................................................................

Add to Reading List

Source URL: www.cellebrite.com

Language: English - Date: 2015-04-08 06:59:20
104Computer network security / Security / Computing / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Appliance / ISCSI / Packet capture appliance

Network Forensics Appliance Diagram

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-01-09 14:49:07
105Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
106Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
107Software / Computing / System software / Web scraping / Wireshark / Computer networking / Cyberwarfare / Network forensics / Wireless networking / Internet protocol suite / Port scanner / Transmission Control Protocol

COURSE COST ESTIMATOR and QUOTE REQUEST PDF VersionWelcome to the Course Estimator and Quote Request Form Ready to train your team on Wireshark, TCP/IP analysis, troubleshooting and network forensics? Determi

Add to Reading List

Source URL: www.chappellu.com

Language: English - Date: 2012-07-03 17:20:13
108Economy / Economics / Business / Localism / Sustainable food system / Fiscal multiplier / Fiscal policy / Tax / Sonoma /  California / Grocery store / MIG /  Inc. / Local purchasing

Going Local As a Retailer: Oliver’s Market 2016 December 1, 2015 Economic Forensics and Analytics

Add to Reading List

Source URL: www.oliversmarket.com

Language: English - Date: 2016-02-08 14:00:11
109Misconduct / Cybercrime / Security / Crime / Crime prevention / Computer security / Harassment / Computer forensics / High Technology Crime Investigation Association / Art Bowker

I’ve been a member of HTCIA since the early 90’s. I have greatly benefitted from this organization and I’d like to do all that I can to give back and see HTCIA thrive. I strongly believe we are all a team and need

Add to Reading List

Source URL: www.htcia.org

Language: English - Date: 2015-08-25 14:21:33
110Business / Economy / Madoff investment scandal / KPMG / Apache Hadoop / Ernst & Young / Limited liability partnership / Big Four accounting firms

Hadoop Forensics Be in a defensible position. Be cyber resilient. June 2016

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:34
UPDATE