INDEX
180 day rule 112
violations of 14
access control, re-establishing after system compromised 58
AccessData
AD eDiscovery 126
Enterprise 168
FTK Imager 164
memory analysis with Enterprise 167
Mobile Phone Examiner+ 126, 186
acquisition
report of findings 192
agile software development 45
AlienVault
Open Threat Exchange 49
allocation units see clusters
‘always on,’ 148
Amazon Web Services (AWS) 170, 174–5
S3 (Simple Storage Service) 172
American Academy of Forensic Sciences 115
relevant items 145
analysis of evidence ...
Get Hands-on Incident Response and Digital Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.