Forensics

Results: 1448



#Item
751

Company LOGO SuperSize Your Internet Timeline

Add to Reading List

Source URL: digital-forensics.sans.org

- Date: 2014-06-11 17:22:59
    752Electronic warfare / Hacking / Military technology / Malware / Cyberwarfare / Computer crimes

    THE DIAMOND MODEL FOR INTRUSION ANALYSIS: A PRIMER Andy Pendergast © 2014 Cyber Squared Inc.

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-02-21 09:55:47
    753Scripting languages / Grep / Filter / Find / AWK / Pcap / Chmod / Ls / Sed / Software / Computing / Unix

    FOR572_Linux_Shell_Survival_Guide_v1.1

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2014-12-15 12:29:33
    754

    Moving from SIEM to Security Analytics: Evolution or Starting Over? John Pescatore, Director, SANS 1111

    Add to Reading List

    Source URL: digital-forensics.sans.org

    - Date: 2014-02-18 18:50:01
      755Technical analysis / Volatility / Chess endgames / Chess theory / Mathematical finance

      Thought-provoking and inspiring Michael Cloppert Chief Research Analyst, Lockheed Martin CIRT The George Washington University

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-02-18 18:48:37
      756Europe / Bitstream Vera / Prague / Geography of Europe

      One  Location  to   Rule  Them  All   mac4n6   Artifacts  Location  

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-10-22 12:55:34
      757Network protocols / Media Transfer Protocol / Portable media players / Picture Transfer Protocol / USB mass-storage device class / Digital audio players / Universal Serial Bus / Windows Image Acquisition / Windows / Microsoft Windows / Computing / Computer hardware

      USB Devices and Media Transfer Protocol Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-06-11 17:22:54
      758Operating system / Kernel / Linux / Architecture of Windows NT / Debuggers / Integrated development environments / Computing / Software / Cross-platform software

      Rekall Memory Forensics Michael Cohen [removed] What is Rekall? ● An advanced memory analysis solution.

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-10-22 12:55:30
      759Computing / MyISAM / Database engine / InnoDB / SQL / MySQL Federated / MySQL / Data management / Software

      Forensic Analysis of MySQL DB Systems Marcel Niefindt | SANS DFIR Prague 2014 Prague, [removed] whoami Abstract

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-10-22 12:55:37
      760Basketball / ULEB Cup 2004–05 Regular Season Group A

      SANS Cyber Threat Intelligence Summit Recent Threat Trend Analysis Scott Montgomery VP, CTO Public Sector [removed]

      Add to Reading List

      Source URL: digital-forensics.sans.org

      Language: English - Date: 2014-02-18 18:51:46
      UPDATE