Computer Forensics Body of Knowledge: Application Forensics
Introduction This article provides a quick comprehensive survey of digital forensics and covers its various aspects from the technical side, varied analysis approaches, and common tools. It can be used...
View ArticleComputer Forensics: Web, Email, and Messaging Forensics
Introduction The last couple of decades brought us several astonishing developments in technology, but what amazes me is the fact that, most of the time, we take those things for granted and simply pay...
View ArticleComputer Forensics: Overview & Types of Database Forensics
What Is Database Forensics? This question is often asked by new students who are thinking about entering this exciting and dynamic subset of computer forensics. The answer is quite detailed, but we can...
View ArticleComputer Forensics: Overview of Software Forensics
Introduction The number of instances and severity of computer-based attacks such as viruses and worms, Trojan horses, logic bombs, and plagiarism of software source code has become of increasing...
View ArticleComputer Forensics: Overview of Malware Forensics [Updated 2019]
Introduction Investigating the competence of malicious software enables the IT team to enhance the assessment of a security incident, and may help prevent more infections. A considerable quantity of...
View Article
More Pages to Explore .....