• LOGIN
  • No products in the cart.

Meet our expert – Deivison Franco

1

Deivison P. Franco: Master in Computer Science and in Business Administration. Specialist in Forensic Science (Emphasis in Computer Forensics) and in Computer Networks Support. Degree in Data Processing. Senior Analyst of Information Security at Bank of Amazon. College Professor. Judicial and Extrajudicial Computer Forensics Expert. Researcher and Consultant in Computer Forensics and Information Security. Member of the IEEE Information Forensics and Security Technical Committee (IEEE IFS-TC) and of the Brazilian Society of Forensic Sciences (SBCF). C|EH, C|HFI, DSFE and ISO 27002 Senior Manager. Author and technical reviewer of the book Treatise of Computer Forensics. Reviewer and editorial board member of the Brazilian Journal of Criminalistics and of the Digital Security Magazine. Regular author for the eForensics Magazine. Columnist of the magazines CryptoID and Digital Security.


Contributions:

  1. Forensic Computing of Virtualized Environments – Live Analysis and Dead Analysis Approaches”. Find it in: eForensics Magazine – SIM Card Analysis. Pages 32 to 37 – published in September 2012.
  2. “Security in Wireless Sensor Networks – Major Attacks, Encryption Algorithms and Security Protocols”. Find it in: Hakin9 Magazine – Mobile Security – To Hack ou Not To Hack?. Pages 30 to 38 – published in November 2012.
  3. “Approaches for Computer Forensics in Virtualized Environments – Live and Dead Analysis Techniques”. Find it in: Hakin9 Magazine – Mobile Security – To Hack ou Not To Hack?. Pages 40 to 46 – published in November 2012.
  4. “Forensics on Smartphones – A Technique for Apprehension, Acquisition, Examination and Analysis of Evidences in Android Operating Systems”. Find it in: Hakin9 Magazine – Mobile Security – To Hack ou Not To Hack?. Pages 48 to 54 – published in November 2012.
  5. “Security in Wireless Sensor Networks – Major Attacks, Encryption Algorithms and Security Protocols”. Find it in: eForensics Magazine – Network. Pages 44 to 52 – published in December 2012.
  6. “How to Perform Forensic Analysis on iOS Operating and File Systems”. Find it in: eForensics Magazine – Computer Forensics JumpStart Vol. 2. Pages 14 to 25 – published in July 2013.
  7. “How to Perform Searches, Seizures and Incident Responses on iPhones”. Find it in: eForensics Magazine – TOUCH (iOS, Android and Windows Mobile) STONE. Pages 60 to 69 – published in October 2013.
  8. “How to Perform Forensic Analysis on iOS Operating and File Systems”. Find it in: eForensics Magazine – 101 Best Forensics Tutorials. Pages 92 to 113 – published in November 2013.
  9. “How to Perform Forensic Analysis on iOS Operating and File Systems”. Find it in: eForensics Magazine – Windows/Mac Forensics Lab. Pages 22 to 33 – published in December 2013.
  10. “How to Perform a Basic and Fast Forensic Analysis on Macintosh Operating Systems – A Quick Start Guide”. Find it in: eForensics Magazine – Windows/Mac Forensics Lab. Pages 92 to 99 – published in December 2013.
  11. “How to Perform Searches, Seizures and Incident Responses on iPhones”. Find it in: eForensics Magazine – Mobile Forensics Compendium. Pages 76 to 85 – published in January 2014.
  12. “Forensic Computing of Virtualized Environments – Live Analysis and Dead Analysis Approaches”. Find it in: eForensics Magazine – Mobile Forensics Compendium. Pages 242 to 249 – published in January 2014.
  13. “How to Perform a Basic and Fast Forensic Analysis on Macintosh Operating Systems – A Quick Start Guide”. Find it in: eForensics Magazine – Best Forensics Tutorials Part 2. Pages 102 to 109 – published in May 2015.
  14. “How to Perform Forensic Analysis on iOS Operating and File Systems”. Find it in: eForensics Magazine – Best Forensics Tutorials Part 3. Pages 118 to 129 – published in June 2015.
  15. “How to Perform Searches, Seizures and Incident Responses on iPhones“. Find it in: eForensics Magazine – Best Forensics Tutorials Part 3. Pages 130 to 142 – published in June 2015.
  16. “How to Detect Antiforensic Techniques”. Find it in: eForensics Magazine – Antiforensic Techniques. Pages 45 to 68 – published in April 2016.
  17. “Digital Forensic Investigations on Social Networks”. Find it in: eForensics Magazine – Antiforensic Techniques. Pages 85 to 96 – published in April 2016.
  18. “SCADA Forensics”. Find it in: eForensics Magazine – Tools of the Trade. Pages 63 to 76 – published in August 2016.
  19. “Car Hacking and Forensics”. Find it in: eForensics Magazine – Car Hacking and Forensics. Pages 24 to 44 – published in October 2016.
  20. “Like Research, Like Studying, Like Challenges, Never Settle for the Obvious” – Interview about the book “Treatise of Computer Forensics”. Find it in: eForensics Magazine – Car Hacking and Forensics. Pages 45 to 49 – published in October 2016.
  21. “Graphorensics Tool – A Computational Tool for Forensic Analysis and Authenticity Verification of Handwritten Signatures Through Digital Image Processing and Artificial Neural Networks”. Find it in: eForensics Magazine – Beyond Forensics. Pages 27 to 40 – published in November 2016.
  22. “Cyberwar”. Find it in: eForensics Magazine – Wireless Attacks: Detection, Prevention, Forensics. Pages 89 to 103 – published in December 2016.
  23. “How to Perform Memory Forensics on Linux”. Find it in: In eForensics Magazine – Linux Memory Forensics. Pages 26 to 51 – published in July 2017.
  24. “Forensics of Things – Digital Forensics in IoT”. Find it in: In eForensics Magazine – Forensics of Things. Pages 11 to 43 – published in July 2017.
  25. “Performing Penetration Test on Wi-Fi Networks with Aircrack-NG”. Find it in: In PenTest Magazine – Penetration Test on Wi-Fi Networks. Pages 15 to 27 – published in August 2017.

Are you an author? Have you published an article in eForensics, Hakin9, or PenTest magazines? Would you like a profile page of your own?

Let us know!

August 30, 2017
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013