Computer Forensics

Online resources

Blogs

Books

Articles/Journals

Being an Expert Witness or Consulting for Counsel

Digital Timestamping

Guidelines and standards

Reverse engineering/Debugging/Malware Analysis

Anti-Forensics (Note: Use these on an isolated analysis system)

Secure Deletion

Cell Phone/Mobile Forensics

Rootkit identification utilities

File system integrity checking tools

Destruction/Recovery of data

Incident costs, damage estimation, and risk analysis

Jobs