July 2018
Beginner to intermediate
232 pages
7h 59m
English
180 day rule 112
violations of 14
access control, re-establishing after system compromised 58
AccessData
AD eDiscovery 126
Enterprise 168
FTK Imager 164
memory analysis with Enterprise 167
Mobile Phone Examiner+ 126, 186
acquisition
report of findings 192
agile software development 45
AlienVault
Open Threat Exchange 49
allocation units see clusters
‘always on,’ 148
Amazon Web Services (AWS) 170, 174–5
S3 (Simple Storage Service) 172
American Academy of Forensic Sciences 115
relevant items 145
analysis of evidence ...