http://www.youtube.com/watch?v=WkHkryIoLD0
http://www.youtube.com/watch?v=yzJG7GPuFyo
http://www.youtube.com/watch?v=bF8UpDbAuJk
http://www.youtube.com/watch?v=ETav2QMvmK4
http://www.youtube.com/watch?v=kkz-SNJCzqE
http://www.youtube.com/watch?v=S4up0vgQJgM
http://www.youtube.com/watch?v=GkG-NXHGn8I
http://www.youtube.com/watch?v=U4P1o0OspLY
Saturday, November 14, 2009
COMPUTER FORENSICS
https://blogs.sans.org/computer-forensics/2009/07/22/security-intelligence-introduction-pt-1/
https://blogs.sans.org/computer-forensics/2009/07/23/security-intelligence-introduction-pt-2/
http://www.hakin9.org/system/articles/attachment1s/8174/original/openSSL__EN.pdf?1253518403
http://hakin9.org/system/articles/attachment1s/8106/original/01_2009.pdf?1249336886
https://blogs.sans.org/computer-forensics/2009/07/23/security-intelligence-introduction-pt-2/
http://www.hakin9.org/system/articles/attachment1s/8174/original/openSSL__EN.pdf?1253518403
http://hakin9.org/system/articles/attachment1s/8106/original/01_2009.pdf?1249336886
Subscribe to:
Posts (Atom)