Back to Results
First PageMeta Content
Computing / Malware / Anti-computer forensics / Network forensics / Global Information Assurance Certification / Forensic science / Packet capture / Mobile device forensics / Department of Defense Cyber Crime Center / Digital forensics / Computer security / Cybercrime


T h e A l l F o r e n s i c s Tr a i n i n g E v e n t March 5-10, 2014 | M o n t e r e y, C A
Add to Reading List

Document Date: 2013-11-08 15:24:18


Open Document

File Size: 1,45 MB

Share Result on Facebook

Company

Twitter / Google / DRISCOLL STRAWBERRY ASSOCIATES INC. / Microsoft / /

IndustryTerm

storage media / iOS devices / web applications / wireless network traffic / transient communications / skills to handle mobile devices / man-in-the-middle tools / file systems / web browser malware / media exploitation / engineer custom network / system-monitoring tools / smartphone applications / open source tools / /

OperatingSystem

Linux / Microsoft Windows / /

Organization

FOR572 REM / Federal Bureau of Investigation / /

Person

Heather Mahalik / Alissa Torres / Chad Tilbury / Rob Lee / John Strand / MARTIN HEYDE / Lenny Zeltser / Cindy Murphy / MATTHEW EDMONDSON / Philip Hagen / Phil Hagen / Lenny Zeltser Knowing / DON DOREY / CRAIG GOLDSMITH / /

Position

investigator / digital forensic analyst / engineer / /

Product

iPhone / /

ProgrammingLanguage

ActionScript / R / C / JavaScript / VB / /

Technology

encryption / ActionScript / man-in-the-middle tools Analyze network protocols / Linux / smartphones / Smartphone / GPS / Mobile Device / operating system / SSL / Flash / PDF / mobile devices / /

SocialTag