Computer and Intrusion Forensics
Computer and Intrusion Forensics
Incident Response & Computer Forensics, 2nd Ed.
Incident Response & Computer Forensics, 2nd Ed.
Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series)
Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series)
Microsoft log parser toolkit
Forensic analysis of Windows hosts using UNIX-based tools
Digital Investigation: The International Journal of Digital Forensics & Incident Response
The Windows Registry as a forensic resource
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Computer Forensics and Culture
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Hi-index | 0.00 |
The pervasiveness of information technology and the ever-increasing dependence of society on the availability of computers and network systems present a new frontier for business enterprises and law enforcement agencies. Attacks on these systems become an everyday occurrence. As such, every organization should assume responsibility in establishing a reasonably secure system to protect its own interests as well as those of its customers. And as computer crime steadily grows, so does the need for computer security professionals trained in gathering, correlating and analyzing digital forensic evidence. This paper presents the various digital forensics laboratory projects that are designed to be implemented in a controlled Computer Security and Forensic Analysis (CSFA) laboratory. The principal objective of the projects is to provide future computer security professionals the necessary hands-on training in digital forensics investigation.