Browsing by Subject / Keyword "Computer -- Access control"
Now showing items 1-1 of 1
-
Diving into windows memory forensics
(2013-08-23)During a forensic investigation of a computer system, the ability to retrieve volatile information can be of critical importance. The contents of RAM could reveal malicious code running on the system that has been deleted ...