Forensics

Results: 1448



#Item
131Energy conservation / Hibernation / Memory forensics / Windows NT kernel / Rootkit / Kernel / Windows XP / Native API / Paging / Microsoft Windows / Windows Vista / Windows 7

Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics?

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2012-10-01 09:12:55
132

HYPERVISOR MEMORY FORENSICS Hypervisor Memory Forensics Mariano Graziano and Davide Balzarotti SANS DFIR EU SUMMIT OctoberPrague

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2013-10-22 14:00:52
    133

    Analysis of Trace Residues of Explosive Materials by Time-of-Flight LC/MS Application Forensics

    Add to Reading List

    Source URL: 911research.wtc7.net

    Language: English - Date: 2009-04-12 02:42:28
      134

      TO ALL ATTORNEYS, PARALEGALS & LEGAL PROFESSIONALS The LAPA’s Downtown Section Presents: Electronic Evidence & Computer Forensics: The New Frontier Presented by Michael Sarlo, EnCE, RCA, CBE, CCLO, CCPA This seminar wi

      Add to Reading List

      Source URL: www.lapa.org

      Language: English - Date: 2016-04-04 19:28:13
        135

        Special PublicationRevision 1 (Draft) Guidelines on Mobile Device Forensics (Draft) Recommendations of the National Institute

        Add to Reading List

        Source URL: www.nist.gov

        Language: English - Date: 2013-09-30 12:23:50
          136

          Navigating Unmountable Media with the Digital Forensics XML
 File System Alex J. Nelson NIST, Computer Security Division CurateGear

          Add to Reading List

          Source URL: ils.unc.edu

          Language: English - Date: 2016-01-14 08:18:20
            137

            Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 6th, 2011 Forensics Tools for Social Network Security Vishal Almeida, Andrew Karnbad, Palak Shah, and Steve Kim Seidenberg School of CSIS, Pace Uni

            Add to Reading List

            Source URL: csis.pace.edu

            Language: English - Date: 2011-05-02 15:15:03
              138Computer forensics / AT Attachment / Host protected area / Information technology audit / Center for Advanced Security Research Darmstadt / Device configuration overlay / Baier / International Monetary Fund / Anti-computer forensics / IMF

              AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASED

              Add to Reading List

              Source URL: www.imf-conference.org

              Language: English - Date: 2014-05-21 12:58:53
              139

              Forensics: The Next Frontier for Biometrics Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 27, 2015

              Add to Reading List

              Source URL: biometrics.cse.msu.edu

              Language: English - Date: 2015-11-03 15:20:16
                140Aachen / Computer forensics / FH Aachen / RWTH Aachen University / Volatility

                Digital Forensics of RAM Images Using VOLIX II Patrick Bock FH Aachen, University of Applied Sciences

                Add to Reading List

                Source URL: www.imf-conference.org

                Language: English - Date: 2014-05-21 12:58:10
                UPDATE