![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/unknown.gif) | A Guide to Forensic Testimony.chm | 2019-03-07 16:52 | 2.7M | |
![[ ]](/icons/layout.gif) | A Survey about Impacts of Cloud Computing on Digital Forensics.pdf | 2019-03-07 18:14 | 2.9M | |
![[ ]](/icons/layout.gif) | An Introduction to Windows Memory Forensic.pdf | 2019-03-07 18:14 | 176K | |
![[ ]](/icons/layout.gif) | CD And DVD Forensics.pdf | 2019-03-07 15:27 | 5.1M | |
![[ ]](/icons/layout.gif) | CFTT Computer Forensics Tool Testing HandBook - 08.11.2015.pdf | 2016-01-28 00:57 | 900K | |
![[ ]](/icons/layout.gif) | Computer & Intrusion Forensics.pdf | 2019-03-07 15:43 | 2.8M | |
![[ ]](/icons/layout.gif) | Computer Forensics A Pocket Guide 2010.pdf | 2019-03-07 17:22 | 1.2M | |
![[DIR]](/icons/folder.gif) | Corsi/ | 2021-04-25 19:13 | - | |
![[ ]](/icons/layout.gif) | Cyber Crime Investigators Field Guide.pdf | 2019-03-07 15:44 | 2.3M | |
![[ ]](/icons/layout.gif) | Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf | 2019-03-07 15:44 | 3.7M | |
![[ ]](/icons/layout.gif) | Cyber Fraud.pdf | 2019-03-07 15:35 | 40M | |
![[ ]](/icons/layout.gif) | Cyber Spying - Tracking Your Familys (Sometimes) Secret Online Lives.pdf | 2019-03-07 15:45 | 106M | |
![[ ]](/icons/unknown.gif) | Digital Evidence & Computer Crime - Forensic Science, Computers and the Internet - 2nd Edition.chm | 2019-03-07 15:45 | 31M | |
![[ ]](/icons/layout.gif) | Digital Forensics File Carving Advances.pdf | 2019-03-07 18:14 | 1.1M | |
![[ ]](/icons/unknown.gif) | Disassembling Code - IDA Pro & SoftICE.chm | 2019-03-07 15:45 | 4.1M | |
![[ ]](/icons/layout.gif) | EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide - 2nd Edition.pdf | 2019-03-07 15:46 | 23M | |
![[ ]](/icons/layout.gif) | File Carving.pdf | 2019-03-07 18:01 | 1.5M | |
![[ ]](/icons/layout.gif) | File Formats Handbook.pdf | 2018-11-28 06:27 | 68M | |
![[ ]](/icons/unknown.gif) | File System Forensic Analysis.chm | 2019-03-07 15:46 | 3.8M | |
![[ ]](/icons/layout.gif) | Finding Digital Evidence in Physical Memory.pdf | 2019-03-07 18:14 | 2.5M | |
![[ ]](/icons/layout.gif) | Forensic Computer Crime Investigation.pdf | 2019-03-07 15:47 | 2.7M | |
![[ ]](/icons/layout.gif) | Forensic Computing - A Practitioners Guide - 2nd Edition.pdf | 2019-03-07 15:47 | 9.6M | |
![[ ]](/icons/layout.gif) | Forensics ToolKit Users Guide.pdf | 2019-03-07 13:48 | 3.6M | |
![[ ]](/icons/layout.gif) | Graphic File Carving AAFS 2015.pdf | 2016-01-28 00:56 | 11M | |
![[ ]](/icons/layout.gif) | Hackin9 - Flash Memories Mobile Forensics.pdf | 2019-03-07 13:39 | 7.0M | |
![[ ]](/icons/layout.gif) | Handbook of Digital & Multimedia Forensic Evidence.pdf | 2019-03-07 15:49 | 2.0M | |
![[ ]](/icons/layout.gif) | Hiding the Hidden - A Software System for Concealing Ciphertext as Innocuous Text - Excerpt.pdf | 2019-03-07 18:26 | 184K | |
![[ ]](/icons/layout.gif) | Hiding the Hidden - A Software System for Concealing Ciphertext as Innocuous Text - Thesis.pdf | 2019-03-07 18:26 | 476K | |
![[DIR]](/icons/folder.gif) | Incident Response/ | 2021-05-05 12:12 | - | |
![[ ]](/icons/layout.gif) | Internet File Formats.pdf | 2018-11-28 06:26 | 17M | |
![[ ]](/icons/layout.gif) | Intro to Digital Forensics.pdf | 2016-01-28 00:56 | 1.8M | |
![[ ]](/icons/layout.gif) | Investigating Computer-Related Crime - A Handbook for Corporate Investigators.pdf | 2019-03-07 15:52 | 1.2M | |
![[ ]](/icons/unknown.gif) | Investigative Data Mining for Security & Criminal Detection.chm | 2019-03-07 15:52 | 25M | |
![[ ]](/icons/unknown.gif) | Investigators Guide to Steganography.chm | 2019-03-07 16:53 | 6.4M | |
![[ ]](/icons/layout.gif) | Kroll Ontrack Easy Recovery Professional 6.2 - Manual.pdf | 2012-09-01 02:05 | 441K | |
![[ ]](/icons/layout.gif) | LiME - Linux Memory Extractor.pdf | 2019-03-07 18:14 | 629K | |
![[DIR]](/icons/folder.gif) | Malware/ | 2021-04-26 19:00 | - | |
![[ ]](/icons/layout.gif) | Measuring and Improving the Quality of File Carving Methods.pdf | 2019-03-07 18:14 | 626K | |
![[ ]](/icons/layout.gif) | Memory Analysis.pdf | 2019-03-07 18:14 | 1.9M | |
![[ ]](/icons/layout.gif) | Multimedia Forensics & Security.pdf | 2019-03-07 15:55 | 11M | |
![[ ]](/icons/layout.gif) | PC-based Partitions.pdf | 2016-01-24 14:51 | 273K | |
![[ ]](/icons/layout.gif) | Partition Types.pdf | 2019-03-07 18:01 | 30K | |
![[ ]](/icons/layout.gif) | Physical Memory Forensics.pdf | 2019-03-07 18:14 | 451K | |
![[ ]](/icons/layout.gif) | Physical Memory Forensics for Files and Cache.pdf | 2020-04-14 23:06 | 367K | |
![[ ]](/icons/layout.gif) | Pool Allocations in Windows Memory Forensics.pdf | 2019-03-07 18:14 | 260K | |
![[DIR]](/icons/folder.gif) | Reports/ | 2021-04-21 17:33 | - | |
![[DIR]](/icons/folder.gif) | Reverse Engineering/ | 2022-09-29 23:29 | - | |
![[ ]](/icons/layout.gif) | Reversing Android Malware.pdf | 2019-03-07 18:14 | 1.7M | |
![[ ]](/icons/layout.gif) | Scalpel - A Frugal High Performance File Carver.pdf | 2019-03-07 18:14 | 362K | |
![[ ]](/icons/layout.gif) | Smart TV Forensics - Digital Traces on Televisions.pdf | 2019-03-07 13:39 | 5.4M | |
![[ ]](/icons/layout.gif) | Smart TV Forensics.pdf | 2019-03-07 13:39 | 1.1M | |
![[ ]](/icons/layout.gif) | Study of Peer-to-Peer Network Based Cybercrime Investigation.pdf | 2019-03-02 00:38 | 11M | |
![[ ]](/icons/layout.gif) | Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf | 2019-03-07 16:00 | 2.4M | |
![[ ]](/icons/layout.gif) | Tecniche e strumenti per Acquisizione e Analisi di dispositivi mobili.pdf | 2012-04-19 13:32 | 8.8M | |
![[ ]](/icons/layout.gif) | Tesina Live Forensics.pdf | 2019-03-07 20:09 | 5.7M | |
![[ ]](/icons/layout.gif) | The Acquisition and Analysis of Random Access Memory.pdf | 2019-03-07 18:15 | 156K | |
![[ ]](/icons/layout.gif) | The Official CHFI Study Guide for Computer Hacking Forensics Investigators [Exam 312-49].pdf | 2019-03-07 16:01 | 15M | |
![[ ]](/icons/layout.gif) | The VAD Tree: A Process-Eye View of Physical Memory.pdf | 2019-03-07 18:14 | 152K | |
![[ ]](/icons/layout.gif) | UNIX & Linux Forensic Analysis DVD Toolkit.pdf | 2019-03-07 16:02 | 5.1M | |
![[ ]](/icons/layout.gif) | Understanding Forensic Digital Imaging.pdf | 2019-03-07 16:02 | 15M | |
![[ ]](/icons/layout.gif) | Using Every Part of the Buffalo in Windows Memory Analysis.pdf | 2019-03-07 18:14 | 480K | |
![[ ]](/icons/layout.gif) | Windows Forensic Analysis DVD Toolkit.pdf | 2019-03-07 20:09 | 4.4M | |
![[ ]](/icons/unknown.gif) | Windows Forensics & Incident Recovery.chm | 2019-03-07 16:02 | 7.2M | |
![[ ]](/icons/layout.gif) | Windows Memory Forensics with Volatility.pdf | 2019-03-07 18:15 | 10M | |
|