Kornblum

Results: 23



#Item
11ISO standards / Computer file formats / JPEG / Information / Quantization / Lossy compression / Lossless data compression / DC3 / Evaluation / Data compression / Graphics file formats / Computing

JPEG Quantization Tables DC3 Jesse Kornblum Overview

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2008-08-21 00:22:11
12Knowledge / Moral responsibility / Philosophy of life / Social philosophy / Michael Ignatieff / Responsibility to protect / Social responsibility / John C. Kornblum / Ethics / Sociological terms / Sociology

1 0   t h e b e r l i n j o u r na l · t w e n t y-s i x · s p r i ng[removed]NORMS AND STATECRAFT How can we think about responsibility

Add to Reading List

Source URL: www.americanacademy.de

Language: English - Date: 2014-06-04 05:25:37
13Search algorithms / Hash functions / MD5 / SHA-1 / Rolling hash / Error detection and correction / Hashing / Cryptographic hash functions

ManTech SMA Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:18
14Hashing / System software / Search algorithms / Data synchronization / Rsync / MD5 / Hash function / Andrew Tridgell / Rolling hash / Error detection and correction / Computing / Cryptographic hash functions

ManTech International Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:23:00
15Cryptographic hash functions / Md5deep / Public domain software / Md5sum / MD5 / GNU Core Utilities / Dd / Kornblum / DAR / Software / System software / Computing

Microsoft PowerPoint - Open Source in Computer Forensics.ppt

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:12:25
16Hashing / Cryptographic hash functions / Search algorithms / Md5deep / Public domain software / Hash function / MD5 / Crypt / Rsync / Error detection and correction / Computing / Software

ManTech SMA Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:43:39
17

Artificial Intelligence in Computer Forensics Jesse Kornblum [removed] Image courtesy Flickr user free-stock and used under a Creative Commons License, http://www.flickr.com/photos/free-stock[removed]

Add to Reading List

Source URL: jessekornblum.com

- Date: 2011-12-12 16:31:46
    18

    What Windows Area Needs Additional Research and Development? Jesse Kornblum Introduction

    Add to Reading List

    Source URL: jessekornblum.com

    - Date: 2010-06-30 08:51:38
      19Microsoft Windows / System software / BitLocker Drive Encryption / Key / TrueCrypt / Cryptography / Disk encryption / Software / Cryptographic software

      SMA CYBER Sector Practical Cryptographic Key Recovery Jesse Kornblum

      Add to Reading List

      Source URL: jessekornblum.com

      Language: English - Date: 2009-01-16 06:50:13
      20Ding / Hash function / Doorbell / Software / Md5deep / Public domain software / Kornblum

      C Y B E R S E C T O R Forensics Tools Panel Jesse Kornblum

      Add to Reading List

      Source URL: jessekornblum.com

      Language: English - Date: 2009-07-08 17:44:59
      UPDATE