Forensics

Results: 1448



#Item
451

San Diego Medical Examiner Forensics Center area blue print/map

Add to Reading List

Source URL: www.calrecycle.ca.gov

- Date: 2015-04-14 21:44:05
    452Econometrics / Estimation theory / Statistical theory / Steganalysis / Digital watermarking / Jessica Fridrich / JPEG / Regression analysis / Cross-validation / Statistics / Cryptography / Steganography

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRILFrom Blind to Quantitative Steganalysis Tomáš Pevný, Jessica Fridrich, Member, IEEE, and Andrew D. Ker, Member, IEEE

    Add to Reading List

    Source URL: www.cs.ox.ac.uk

    Language: English - Date: 2012-04-21 10:14:54
    453Forensic Toolkit / Computer security / Information technology audit / Mobile device forensics

    In 2011, over 800 million mobile devices and close to 40,000 models were manufactured in China. In 2012, more than half of those were exported to world markets comprising more than 30% of the global cell phone market. Is

    Add to Reading List

    Source URL: www.siquest.com

    Language: English - Date: 2014-10-16 23:29:22
    454Imaging / Digital camera / Camera phone / Red Digital Cinema Camera Company / Digital single-lens reflex camera / Image noise / Camera / Statistical classification / Digital photography / Image processing / Optics

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBERBlind Identification of Source Cell-Phone Model Oya Çeliktutan, Bülent Sankur, Senior Member, IEEE, and ˙Ismail Avcibas¸, Me

    Add to Reading List

    Source URL: www.busim.ee.boun.edu.tr

    Language: English - Date: 2009-01-19 10:35:12
    455Cellebrite / Mobile device forensics / .mobi / Mobile phone / Nokia / Mobile business intelligence / Mobile web analytics / Technology / Mobile technology / Mobile computers

    Delivering Mobile Expertise Cellebrite develops advanced mobile data solutions, enabling the extensive use and management of mobile phone data to provide value for two distinct mobile domains: mobile lifecycle and mobil

    Add to Reading List

    Source URL: 54.209.8.61

    Language: English - Date: 2015-03-29 11:19:14
    456Software / Disk image emulators / Archive formats / Computer file formats / Disk image / File dialog / VHD / PowerISO / System software / Computing / Disk images

    X-Ways Forensics Quick Guide X-Ways Software Technology AG Carl-Diem-StrBünde

    Add to Reading List

    Source URL: www.winhex.com

    Language: English - Date: 2012-11-02 05:46:26
    457Law enforcement / Police / Public safety / Surveillance / Law / Cyberwarfare / Law enforcement in Japan / National security / Security / Crime prevention

    1. Police InfoCommunications A. Analysis of Computer Systems and Electromagnetic Records (1) Digital Forensics The High-Tech Crime Technology Division with the Digital Forensic

    Add to Reading List

    Source URL: www.npa.go.jp

    Language: English
    458Electronics / Information technology audit / Mobile device forensics / .mobi / Mobile phone / Cellebrite / Mobile cloud computing / Mobile business intelligence / Technology / Electronic engineering / Mobile computers

    The Cellebrite Advantage The Partner of Choice for Mobile Forensics Mobile forensics is our business. Since 1999, we’ve been trusted partners serving customers in the intelligence, public safety, military and enterpri

    Add to Reading List

    Source URL: www.cellebrite.com

    Language: English - Date: 2015-04-01 09:07:45
    459Data / Markup languages / Simson Garfinkel / Year of birth missing / Computer file formats / Filesystem in Userspace / XML / File system / Metadata / Computing / Technical communication / Information

    Enumerating and Analyzing Storage Data with Digital Forensics XML Alex Nelson Prometheus Computing, LLC ! University of California, Santa Cruz

    Add to Reading List

    Source URL: ils.unc.edu

    Language: English - Date: 2015-01-12 08:26:14
    460Science / Forensic science / Penetration test / Forensic disk controller / Disk encryption / Anti-computer forensics / Department of Defense Cyber Crime Center / Digital forensics / Cybercrime / Computer security

    Hostile Forensics by: Mark Lachniet Version 1.0, August 5, 2011 Table of Contents 1. Overview...............................................................................................................................

    Add to Reading List

    Source URL: lachniet.com

    Language: English - Date: 2011-08-05 22:44:24
    UPDATE