In this podcast, participants recount complex, distributed, multi-year investigations of computer crimes using sophisticated methods, techniques, and tools.
Authors: Len Bass, Lutz Wrage, Paul C. Clements, Dionisio de Niz, Peter H. Feiler, Matthew Geiger, Jeffrey Hansen, Jörgen Hansson (University of Skovde), Scott Hissam, James Ivers, Mark H. Klein, Karthik Lakshmanan, Gabriel Moreno, Daniel Plakosh, Ragunathan Rajkumar, Kristopher Rush, Cal Waits, Kurt C. Wallnau
In this report, the authors describe the SEI independent research and development (IRAD) projects conducted during fiscal year 2009.
In this 2008 report, the authors compare various approaches and tools used to capture and analyze evidence from computer memory.
In this podcast, participants discuss how business leaders can play a key role in computer forensics by establishing and testing strong policies.
In this 2005 handbook, the authors help technical staff members who are charged with administering and securing information systems and networks.
In this 2005 handbook, the authors discuss collecting basic forensic data, a training gap in information security, computer forensics, and incident response.