Community

Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing

(David Litchfield) The forensic analysis of a compromised database server presents its own unique challenges. In other areas of computer forensics it’s often obvious that a crime has been committed: pornographic images are discovered on a hard drive; a rootkit has been installed; a system has been

Read More - Register for Free Membership

Tags: