In this report, the authors describe the SEI independent research and development (IRAD) projects conducted during fiscal year 2009.
In this 2008 report, the authors compare various approaches and tools used to capture and analyze evidence from computer memory.
In this podcast, participants discuss how business leaders can play a key role in computer forensics by establishing and testing strong policies.
In this 2005 handbook, the authors help technical staff members who are charged with administering and securing information systems and networks.
In this 2005 handbook, the authors discuss collecting basic forensic data, a training gap in information security, computer forensics, and incident response.