Published Papers

Chapter 4 - PDA, Blackberry, and iPod Forensic Analysis

This chapter discusses the concept of conducting a forensic investigation. The techniques for investigating a mobile device are similar to that of more traditional storage devices. In addition,...

Published on: 2007-10-12

Topic: Audit

The Official CHFI Study Guide

This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal...

Published on: 2007-10-08

Topic: Digital Forensics

Requirements for Record Keeping and Document Destruction in a Digital World

In the day-to-day management of their organisation, company directors, accountants and management often overlook the importance of the documents used by the business. It is crucial to remember...

Published on: 2007-06-05

Topic: Document Management

Download Paper

Beyond Automated Tools and Frameworks: The Shellcode Injection Process

This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as...

Published on: 2007-03-31

Topic: Developer

Download Paper

Taking Control, Functions to DLL Injection

This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the code exploitation process. In this article, we...

Published on: 2007-03-31

Topic: Developer

Download Paper

Understanding Conditionals in Shellcode

This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process. In this article, we...

Published on: 2007-03-31

Topic: Developer

Download Paper

Electronic Contracting, New Wine in Old Bottles

The rise of the Internet as a commercial tool has created a level of uncertainty surrounding the law of offer and acceptance. This paper discusses the implications associated with online...

Published on: 2006-04-23

Topic: Law

Download Paper

Extending Control, API Hooking

This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as...

Published on: 2006-03-05

Topic: Developer

Download Paper

Implementing an Information Security Management System (ISMS) Training process

One of the key controls within any ISMS is it the continued awareness and training of staff and other parties. The focus and topic of this paper consists of the development of an ISO-17799...

Published on: 2005-02-25

Topic: Information Security

Download Paper

Analysis of a Serial Based Digital Voice Recorder

This paper will explore issues with a serially accessed digital voice recorder and in particular the retrieval and analysis of the voice files contained on the device. The device, a "VoiceIt"...

Published on: 2005-02-25

Topic: Digital Forensics

Download Paper