Forensics

Results: 1448



#Item
441Information science / ADAPA / Workflow / Latent semantic indexing / Analytics / Early case assessment / Business intelligence / Statistics / Business

Computer Forensics Data Collection eDiscovery Services Analytics Managed Review Legal Translation

Add to Reading List

Source URL: www.consilio.com

Language: English - Date: 2013-12-17 13:38:53
442Computing / Disk file systems / NTFS / Anti-computer forensics / Timestamp / File system / EnCase / Spyware / Mace / System software / Computer forensics / Espionage

catch me, if you can… james c. foster & vinnie liu blackhat briefingsspeaker bios

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:35
443Cloud computing / Computing / CDiscovery / Information discovery / Civil procedure / Electronic discovery / Email

Computer Forensics Data Collection eDiscovery Services Analytics Managed Review Legal Translation

Add to Reading List

Source URL: www.consilio.com

Language: English - Date: 2013-12-23 16:42:01
444Embedded operating systems / Cisco IOS / Routers / Cisco Systems / IOS / IPv6 / Routing / Cisco Career Certifications / Netflow / Computing / Network architecture / Computer architecture

Microsoft PowerPoint - Developments_in_IOS_Forensics_0.13_export.ppt

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2008-03-07 10:55:29
445Database management systems / SQL / Data / Query languages / Microsoft SQL Server / Windows Server System / Stored procedure / Database Console Commands / SQL injection / Data management / Computing / Relational database management systems

SQL SERVER Anti-Forensics Cesar Cerrudo Introduction

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
446Communication / Translation / Meaning / American Translators Association / OpenLogos / Machine translation / Linguistics / Science

Computer Forensics Data Collection eDisclosure Services Analytics Document Review Legal Translation

Add to Reading List

Source URL: www.consilio.com

Language: English - Date: 2013-07-17 11:12:26
447Software / Computing / IOS / Apple Inc. / Greenpois0n / SHSH blob / IPhone / Smartphones / IOS jailbreaking

Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 Andrey Belenko & Dmitry Sklyarov Elcomsoft Co. Ltd.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:33
448Association of Public and Land-Grant Universities / Middle States Association of Colleges and Schools / Weiss/Manfredi / Weidlinger Associates / Cornell University / Harvard University / Stony Brook University / Ivy League / New York / Association of American Universities

Weidlinger Associates, Inc., is a 300-person structural engineering firm that designs and rehabilitates buildings, bridges, and infrastructure and provides special services in applied science, forensics, and physical sec

Add to Reading List

Source URL: www.wai.com

Language: English - Date: 2015-01-21 10:37:06
449Particle physics / Isotope / Washington State University / Nuclear fuel cycle / Nuclear physics / Physics / Nuclear chemistry

Sponsored by the U.S. Department of Homeland Security Nuclear Forensics Undergraduate Summer School June 15 through July 24, 2015 Washington State University

Add to Reading List

Source URL: pearl1.lanl.gov

Language: English - Date: 2015-03-30 09:04:50
450Computing / System software / Anti-computer forensics / Digital forensics / Rootkit / Memory-mapped file / Data remanence / Computer virus / Paging / Computer security / Virtual memory / Computer forensics

Physical Memory Forensics Mariusz Burdach Overview • •

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
UPDATE