ArchiveNovember 25, 2017

An analysis of different data sources used in a forensics investigation

A

This is post 11 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me