Forensics

Results: 1448



#Item
561Computer forensics / Forensic Science Service / Law enforcement / Science / United Kingdom / Criminology / Forensic science / Heuristics

File: B121 December 2005 Volume 6, Issue 2 NIFS Newsletter

Add to Reading List

Source URL: pandora.nla.gov.au

Language: English - Date: 2010-10-18 21:43:41
562Knowledge / Historiography / Diplomatics / Document forgery / Writing / Questioned document examination / Records management / Internet Archive / Wayback Machine / Archival science / Science / Library science

A Tale of Two Traces – Archives, Diplomatics, and Digital Forensics Fred Cohen – CEO – Management Analytics Abstract—This paper focuses on two examples of legal matters involving archived data, one a digital arch

Add to Reading List

Source URL: all.net

Language: English - Date: 2015-01-22 10:05:11
563Open-source intelligence / Web development / Mashup / Computing / Kodama / World Wide Web / Web 2.0 / Collective intelligence

Maltego Kung-Fu Exploiting Open Source Threat Intelligence Matt Kodama VP Product [removed]

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
564

WebMail Forensics Thomas Akin, CISSP Director, Southeast Cybercrime Institute Kennesaw State University

Add to Reading List

Source URL: www.blackhat.com

- Date: 2014-12-16 19:06:34
    565Intelligence analysis / Research methods / Data collection / Intelligence / Military intelligence / Analysis of Competing Hypotheses / Analysis / Statistical hypothesis testing / Hypothesis / Science / Statistics / Scientific method

    Analysis of Competing Hypotheses An Analytical Process by former CIA analyst Richards J Heuer, Jr. What is analysis?

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2015-02-06 11:01:09
    566EnCase / Certified Forensic Computer Examiner / Forensic Toolkit / Computer forensics / Computer security / Computing

    Software Developer Position

    Add to Reading List

    Source URL: www.htcia.org

    Language: English - Date: 2015-03-05 22:26:22
    567Document retrieval / Document management system / Search engine indexing / Proximity search / DtSearch Corp. / Index / Book:Information retrieval / Subject indexing / Information science / Information retrieval / Full text search

    Indexed Vs. Unindexed Searching: From Security Classifications to Forensics By Elizabeth Thede Both indexed and unindexed searching have their

    Add to Reading List

    Source URL: www.pcai.com

    Language: English - Date: 2011-01-30 13:05:10
    568Computer network security / System software / Software testing / Digital forensics / Drexel University / Eastern Pennsylvania Rugby Union / Forensic Toolkit / EnCase / Penetration test / Computer security / Computing / Computer forensics

    Cindy Casey th 201 South 18 Street, Apt. 620 Philadelphia, PA[removed]2320 [removed]

    Add to Reading List

    Source URL: www.htcia.org

    Language: English - Date: 2015-03-10 13:35:57
    569Forensic science / Heuristics / Science / Computer forensics / Expert witness / Anti-computer forensics / Outline of forensic science / Digital forensics / Law / Criminology

    What is forensic computing?

    Add to Reading List

    Source URL: aic.gov.au

    Language: English - Date: 2009-05-26 13:18:35
    570

    2015 CTI Survey Results Preview Michael Cloppert report author: Dave Shackleford

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2015-02-06 11:01:10
      UPDATE