Published Papers
Chapter 4 - PDA, Blackberry, and iPod Forensic Analysis
This chapter discusses the concept of conducting a forensic investigation. The techniques for investigating a mobile device are similar to that of more traditional storage devices. In addition,...
Published on: 2007-10-12
Topic: Audit
The Official CHFI Study Guide
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal...
Published on: 2007-10-08
Topic: Digital Forensics
Requirements for Record Keeping and Document Destruction in a Digital World
In the day-to-day management of their organisation, company directors, accountants and management often overlook the importance of the documents used by the business. It is crucial to remember...
Published on: 2007-06-05
Topic: Document Management
Download PaperBeyond Automated Tools and Frameworks: The Shellcode Injection Process
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as...
Published on: 2007-03-31
Topic: Developer
Download PaperTaking Control, Functions to DLL Injection
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the code exploitation process. In this article, we...
Published on: 2007-03-31
Topic: Developer
Download PaperUnderstanding Conditionals in Shellcode
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process. In this article, we...
Published on: 2007-03-31
Topic: Developer
Download PaperElectronic Contracting, New Wine in Old Bottles
The rise of the Internet as a commercial tool has created a level of uncertainty surrounding the law of offer and acceptance. This paper discusses the implications associated with online...
Published on: 2006-04-23
Topic: Law
Download PaperExtending Control, API Hooking
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as...
Published on: 2006-03-05
Topic: Developer
Download PaperImplementing an Information Security Management System (ISMS) Training process
One of the key controls within any ISMS is it the continued awareness and training of staff and other parties. The focus and topic of this paper consists of the development of an ISO-17799...
Published on: 2005-02-25
Topic: Information Security
Download PaperAnalysis of a Serial Based Digital Voice Recorder
This paper will explore issues with a serially accessed digital voice recorder and in particular the retrieval and analysis of the voice files contained on the device. The device, a "VoiceIt"...
Published on: 2005-02-25
Topic: Digital Forensics
Download Paper