Category: Academic Life

How to study: Reading a journal article

Academic journal articles come in a variety of flavors, qualities, and availabilities. If you have been gathering journal articles and other artifacts of scholars over your academic career you will have a healthy trove of original and recent articles. Each…

How to study: When there is a text book

The following is NOT the only way to study. It is a way to study and I expect you will adapt it and make it your own. Between an associates degree, two bachelors degrees, a masters degree and a doctoral degree…

Presentations, posts, categories

Presentations (PDF) Teaching Presentation Research Presentation   Blog Posts Considerations of defense in depth Attribution of cyber adversaries Research Note: Defining attacker knowledge, skill, and ability   Blog Categories Digital Forensics Incident Response Threat Intelligence Student Work    

Digital forensic books

A not comprehensive reading list. Some of these are new, some are old, but they give a good overview of the discipline. If the book has exercises it is a good idea to do them.   Operating System and Platform…

The elevator pitch: Research by Sam

I research the threats and crimes against society where processing and communications artifacts are used to disintermediate the human experience. As such I look at computer network attack, computer network exploitation, computer network defense, and apply generalizable aspects of investigation…

Of ex’s and woes

In 1999 I was divorced. I had been separated on and off again about 7 of the 15 years I was married. The end of my marriage was filled some embarrassing events and some things I truly dreaded. A bankruptcy,…

My work review 2013-2014

I got my personnel review (June 1, 2013 to June 1, 2014 ) yesterday from my former department chair. The comment about teaching load and seeking funding along with mentorship really stung. I think I have done pretty good. The…