Computer Forensics

Online resources

Blogs

Books

Articles/Journals

Organizations/conferences/training

Being an Expert Witness or Consulting for Counsel

Digital Timestamping

Guidelines and standards

Interviews

Reverse engineering/Debugging/Malware Analysis

Memory Forensics

Anti-Forensics (Note: Use these on an isolated analysis system)

Encryption/Stegonography

Secure Deletion

Cell Phone/Mobile Forensics

Fingerprint (file hash) databases

Rootkit identification utilities

File system integrity checking tools

Partitioning/File system documentation

Destruction/Recovery of data

Incident costs, damage estimation, and risk analysis

Certificate/Degree Programs