×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
andrew-case documents
Technology
Hunting Mac Malware with Memory Forensics
Technology
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
Technology
Linux Memory Analysis with Volatility
Technology
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced Malware
Technology
Investigating Cooridinated Data Exfiltration
Technology
My Keynote from BSidesTampa 2015 (video in description)
Technology
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced Malware
Technology
Hunting Mac Malware with Memory Forensics
Technology
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
Technology
Unmasking Careto through Memory Forensics (video in description)
Technology
Effective Incident Response in Cloud Environments
Documents
Water of the Word (2nd edition)
Documents
Treasure and tragedy in kmem_cache mining for live forensics investigation
Technology
Proactive Measures to Defeat Insider Threat
Documents
Resume