SlideShare ist ein Scribd-Unternehmen logo
1 von 57
SAK 4801  SPECIAL TOPICS IN COMPUER SCIENCE II Chapter 1 Computer Forensics in Today’s World  Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science and Information Technology University Putra of Malaysia Room No: 2.28 Portions of the material courtesy  EC-Council
Computer Forensics and Investigations
Learning Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter  1 Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.1 Introduction to Computer Forensics
1. 1 Introduction to Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 1 Introduction to Computer Forensics (Cont.) ,[object Object],[object Object],[object Object]
1.2 History of Computer Forensics
1. 2.1  Forensics Science ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 2.2 Evolution Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 2.3 Definition of Forensics Science  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],1. 2.4 Definition of Computer Forensics
[object Object],[object Object],[object Object],1. 2.4 Definition of Computer Forensics (Cont.)
1. 2.5 Computer Forensics Versus  Other Related Disiplines ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],1. 2.5  Computer Forensics Versus Other Related Disiplines (Cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 2.5 Computer Forensics Versus Other Related Disciplines (Cont.)
[object Object],[object Object],[object Object],[object Object],1. 2.5 Computer Forensics Versus Other Related Disciplines (Cont.)
[object Object],[object Object],[object Object],1. 2.5 Computer Forensics Versus Other Related Disciplines (Cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 2.6 Need for Computer Forensics
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 2.6 Need for Computer Forensics (Cont.)
1.3 Computer Forensics Flaws and Risks
1. 3 Computer Forensics Flaws and Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 3 Computer Forensics Flaws and Risks (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
1.4 Cyber Crime
1. 4.1 Definition of Cyber Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 4.1 Definition of Cyber Crime (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
1. 4.1 Definition of Cyber Crime (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 4.2 Digital Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 4.2 Digital Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 4.3 Examples of Cyber Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 4.3 Examples of Cyber Crime (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 4.3 Examples of Cyber Crime (Cont.) ,[object Object],[object Object],[object Object],[object Object]
1.5 Reasons for Attacks
1. 5 Reason for cyber attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.6 Modes for Attacks
1. 6 Modes for attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.7 Role of Computer Forensics
1. 7.1  Stage of Forensic Investigation in Tracking Computer Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. 7.1  Stage of Forensic Investigation in Tracking Computer Crime (Cont.) ,[object Object],[object Object],[object Object],[object Object]
1. 7.2 Rules of Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],1. 7.3  The 3 As of Computer Forensics  Methodology
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.4 Accessing Computer Forensics Resources
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.5 Preparing for Computer Investigations
[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.5  Preparing for Computer Investigations (Cont.)
1. 9 Preparing for Computing Investigations (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.6 Investigation Process
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.6 Investigation Process (Cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.6 Investigation Process (Cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.6 Investigation Process (Cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.6 Investigation Process (Cont.)
[object Object],[object Object],[object Object],1. 7.7  Where and When Do You Use Computer Forensics
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.8 Maintaining Professional Conduct
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1. 7.8 Maintaining Professional Conduct (Cont.)
[object Object],[object Object],1. 7.8 Maintaining Professional Conduct (Cont.)
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
End of Chapter 1

Weitere ähnliche Inhalte

Was ist angesagt?

Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
Conferencias FIST
 

Was ist angesagt? (20)

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Incident response
Incident responseIncident response
Incident response
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imaging
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
cyber security
cyber securitycyber security
cyber security
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Windows Registry Analysis
Windows Registry AnalysisWindows Registry Analysis
Windows Registry Analysis
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 

Andere mochten auch

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
gueste0d962
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power Point
Ayee_Its_Bailey
 
Lecture1
Lecture1Lecture1
Lecture1
rjaeh
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating Access
Aram SE
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
Aram SE
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
Aqib Memon
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
aradhanalaw
 

Andere mochten auch (20)

Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Monte Carlo Simulation
Monte Carlo SimulationMonte Carlo Simulation
Monte Carlo Simulation
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power Point
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010
 
Lecture1
Lecture1Lecture1
Lecture1
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating Access
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical Methods
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
 
Model inquiri
Model inquiriModel inquiri
Model inquiri
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 

Ähnlich wie 01 computer%20 forensics%20in%20todays%20world

A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
BRNSSPublicationHubI
 
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).pptComputer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
BudiHsnDaulay
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
sabtolinux
 

Ähnlich wie 01 computer%20 forensics%20in%20todays%20world (20)

3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
Techniques in Computer Forensics: A Recovery Perspective
Techniques in Computer Forensics: A Recovery PerspectiveTechniques in Computer Forensics: A Recovery Perspective
Techniques in Computer Forensics: A Recovery Perspective
 
180 184
180 184180 184
180 184
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Computer_forensics_ppt.ppt
Computer_forensics_ppt.pptComputer_forensics_ppt.ppt
Computer_forensics_ppt.ppt
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).pptComputer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 

Mehr von Aqib Memon

Mentally slow poision
Mentally slow poisionMentally slow poision
Mentally slow poision
Aqib Memon
 
Human personality and its pathology
Human personality and its pathologyHuman personality and its pathology
Human personality and its pathology
Aqib Memon
 
Corporate crime reporter
Corporate crime reporterCorporate crime reporter
Corporate crime reporter
Aqib Memon
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal code
Aqib Memon
 
Speech preparation
Speech preparationSpeech preparation
Speech preparation
Aqib Memon
 
How to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleHow to handle and help emotionally sensitive people
How to handle and help emotionally sensitive people
Aqib Memon
 
Good sense of humor
Good sense of humorGood sense of humor
Good sense of humor
Aqib Memon
 
Dealing with relatives
Dealing with relativesDealing with relatives
Dealing with relatives
Aqib Memon
 
A guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyA guide to good communication skills even if you are shy
A guide to good communication skills even if you are shy
Aqib Memon
 
Voice & accent
Voice & accentVoice & accent
Voice & accent
Aqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
Aqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
Aqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
Aqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
Aqib Memon
 
how to have New ideas
how to have New ideashow to have New ideas
how to have New ideas
Aqib Memon
 
If i become pm of pakistan
If i become pm of pakistanIf i become pm of pakistan
If i become pm of pakistan
Aqib Memon
 
The way to get rid of fatness
The way to get rid of fatnessThe way to get rid of fatness
The way to get rid of fatness
Aqib Memon
 

Mehr von Aqib Memon (20)

Mentally slow poision
Mentally slow poisionMentally slow poision
Mentally slow poision
 
Human personality and its pathology
Human personality and its pathologyHuman personality and its pathology
Human personality and its pathology
 
Corporate crime reporter
Corporate crime reporterCorporate crime reporter
Corporate crime reporter
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal code
 
Speech preparation
Speech preparationSpeech preparation
Speech preparation
 
How to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleHow to handle and help emotionally sensitive people
How to handle and help emotionally sensitive people
 
Good sense of humor
Good sense of humorGood sense of humor
Good sense of humor
 
Dealing with relatives
Dealing with relativesDealing with relatives
Dealing with relatives
 
A guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyA guide to good communication skills even if you are shy
A guide to good communication skills even if you are shy
 
Voice & accent
Voice & accentVoice & accent
Voice & accent
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
how to have New ideas
how to have New ideashow to have New ideas
how to have New ideas
 
New ideas
New ideasNew ideas
New ideas
 
If i become pm of pakistan
If i become pm of pakistanIf i become pm of pakistan
If i become pm of pakistan
 
The way to get rid of fatness
The way to get rid of fatnessThe way to get rid of fatness
The way to get rid of fatness
 
Steganography
SteganographySteganography
Steganography
 
New ideas
New ideasNew ideas
New ideas
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

01 computer%20 forensics%20in%20todays%20world