{"id":231,"date":"2023-03-12T11:44:08","date_gmt":"2023-03-12T15:44:08","guid":{"rendered":"https:\/\/drkeithjones.com\/?page_id=231"},"modified":"2025-09-16T12:46:05","modified_gmt":"2025-09-16T16:46:05","slug":"my-publications","status":"publish","type":"page","link":"https:\/\/drkeithjones.com\/index.php\/my-publications\/","title":{"rendered":"My Publications"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Books<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Contributing Author, \u201cEncyclopedia of Information Systems and Technology\u201d, Taylor &amp; Francis, December 2015<\/li>\n\n\n\n<li>Author, \u201c<a href=\"https:\/\/www.amazon.com\/Real-Digital-Forensics-Computer-Security\/dp\/0321240693\/ref=sr_1_1?crid=32NTBG0PPLKFZ&amp;keywords=real+digital+forensics&amp;qid=1678636216&amp;sprefix=real+digital+forensics%2Caps%2C79&amp;sr=8-1\" target=\"_blank\" rel=\"noopener\" title=\"\">Real Digital Forensics: Computer Security and Incident Response<\/a>\u201d, Addison-Wesley, September 2005.<\/li>\n\n\n\n<li>Technical Editor, \u201cIncident Response: Investigating Computer Crime\u201d, 2nd Edition, McGraw-Hill, 2003<\/li>\n\n\n\n<li>Author, \u201cAnti-Hacker Tool Kit\u201d, McGraw-Hill, 2002<\/li>\n\n\n\n<li>Contributing Author, \u201cHacker\u2019s Challenge\u201d, FDIC-Insecured, Osborne-McGraw Hill, October 2001<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Articles, Blogs, Books, and Webinars<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>2025\n<ul class=\"wp-block-list\">\n<li>How to Level Up Your Technical Documentation with Microsoft&#8217;s Style Guide and LLMs, Corelight\u2019s Bright Idea Blog, Sept 2025, <a href=\"https:\/\/corelight.com\/blog\/microsoft-style-guide-llm\">https:\/\/corelight.com\/blog\/microsoft-style-guide-llm<\/a><\/li>\n\n\n\n<li>Empowering Your LLMs: Unlocking Cybersecurity Queries with Open WebUI Knowledge Bases, Corelight\u2019s Bright Idea Blog, July 2025, <a href=\"https:\/\/corelight.com\/blog\/llm-cybersecurity-knowledge-base\">https:\/\/corelight.com\/blog\/llm-cybersecurity-knowledge-base<\/a><\/li>\n\n\n\n<li>Leveraging Map-Reduce and LLMs for Enhanced Cybersecurity Network Detection, Corelight\u2019s Bright Idea Blog, Mar 2025, <a href=\"https:\/\/corelight.com\/blog\/map-reduce-llms-cybersecurity-network-detection\">https:\/\/corelight.com\/blog\/map-reduce-llms-cybersecurity-network-detection<\/a><\/li>\n\n\n\n<li>Running DeepSeek AI Privately Using Open-Source Software, Corelight&#8217;s Bright Idea Blog, Feb 2025, <a href=\"https:\/\/corelight.com\/blog\/secure-deepseek-zeek-analysis\" title=\"https:\/\/corelight.com\/blog\/secure-deepseek-zeek-analysis\">https:\/\/corelight.com\/blog\/secure-deepseek-zeek-analysis<\/a><\/li>\n\n\n\n<li>Understand and Detect MITRE Caldera with Zeek, Corelight&#8217;s Bright Idea Blog, Feb 2025, <a href=\"https:\/\/corelight.com\/blog\/understanding-and-detecting-mitre-caldera-with-zeek\">https:\/\/corelight.com\/blog\/understanding-and-detecting-mitre-caldera-with-zeek<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2024\n<ul class=\"wp-block-list\">\n<li>Detecting Abuse of NetSupport Manager, Corelight\u2019s Bright Idea Blog, Sep 2024, <a href=\"https:\/\/corelight.com\/blog\/detecting-netsupport-manager-abuse\">https:\/\/corelight.com\/blog\/detecting-netsupport-manager-abuse<\/a><\/li>\n\n\n\n<li>Detecting The Agent Tesla Malware Family, Corelight\u2019s Bright Idea Blog, July 2024, <br><a href=\"https:\/\/corelight.com\/blog\/detecting-agent-tesla-malware\">https:\/\/corelight.com\/blog\/detecting-agent-tesla-malware<\/a><\/li>\n\n\n\n<li>Detecting the STRRAT Malware Family, Corelight\u2019s Bright Idea Blog, May 2024, <a href=\"https:\/\/corelight.com\/blog\/newsroom\/news\/strrat-malware\">https:\/\/corelight.com\/blog\/newsroom\/news\/strrat-malware<\/a><\/li>\n\n\n\n<li>Hunt of the Month: Detecting AsyncRAT Malware Over HTTPS, Corelight\u2019s Bright Idea Blog, Mar 2024, <a href=\"https:\/\/corelight.com\/blog\/newsroom\/news\/hunt-of-the-month-detecting-async-rat-malware\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/newsroom\/news\/hunt-of-the-month-detecting-async-rat-malware<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=OzddRbB0HDg\">https:\/\/www.youtube.com\/watch?v=OzddRbB0HDg<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2023\n<ul class=\"wp-block-list\">\n<li>Detecting Gozi Banking Malware, Corelight\u2019s Bright Idea Blog, Sep 2023, <a href=\"https:\/\/corelight.com\/blog\/gozi-banking-malware\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/gozi-banking-malware<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2022\n<ul class=\"wp-block-list\">\n<li>IoT\/OT\/ICS Threats: Detecting Vulnerable Boa Web Servers, Corelight\u2019s Bright Ideas Blog, Nov 2022, <a href=\"https:\/\/corelight.com\/blog\/iot-ot-ics-threats-detecting-vulnerable-boa-web-servers\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/iot-ot-ics-threats-detecting-vulnerable-boa-web-servers<\/a><\/li>\n\n\n\n<li>An Introduction to Zeek, an Open Source Network Security Monitoring Tool, Hackin9 Magazine, Oct 2022, Vol 17, No 09, <a href=\"https:\/\/hakin9.org\/product\/future-of-osint\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/hakin9.org\/product\/future-of-osint<\/a><\/li>\n\n\n\n<li>Detecting CVE-2022-23270 in PPTP, Corelight\u2019s Bright Ideas Blog, May 2022, <a href=\"https:\/\/corelight.com\/blog\/detecting-cve-2022-23270-in-pptp\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/detecting-cve-2022-23270-in-pptp<\/a><\/li>\n\n\n\n<li>Detecting CVE-2022-26937 with Zeek, Corelight\u2019s Bright Ideas Blog, May 2022, <a href=\"https:\/\/corelight.com\/blog\/detecting-cve-2022-26937-with-zeek\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/detecting-cve-2022-26937-with-zeek<\/a><\/li>\n\n\n\n<li>Detecting Windows NFS Portmap Vulnerabilities, Corelight\u2019s Bright Ideas Blog, April 2022, <a href=\"https:\/\/corelight.com\/blog\/detecting-windows-nfs-portmap-vulnerabilities\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/detecting-windows-nfs-portmap-vulnerabilities<\/a><\/li>\n\n\n\n<li>Zeek2es.py \u2013 An Application to Make Your Zeek Logs Elastic!, Elastic Community Conference, Feb 2022, Slides: <a href=\"https:\/\/docs.google.com\/presentation\/d\/12iDT3CTPB0PsPaGZ4B0-aSsLCCameD6OG6cfwQBoJvcedit#slide=id.g10a773dc4cc_0_2262\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/docs.google.com\/presentation\/d\/12iDT3CTPB0PsPaGZ4B0-aSsLCCameD6OG6cfwQBoJvcedit#slide=id.g10a773dc4cc_0_2262 <\/a>Video: <a href=\"https:\/\/www.youtube.com\/watch?v=n1x4ShzhAo8&amp;list=PL_mJOmq4zsHbigQnsjEcWed6N7Do5kss_&amp;index=29\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.youtube.com\/watch?v=n1x4ShzhAo8&amp;list=PL_mJOmq4zsHbigQnsjEcWed6N7Do5kss_&amp;index=29<\/a><\/li>\n\n\n\n<li>Zeek in Action: Using spicy-driver, Zeek\u2019s Blog, Jan 2022, <a href=\"https:\/\/docs.google.com\/presentation\/d\/12iDT3CTPB0PsPaGZ4B0-aSsLCCameD6OG6cfwQBoJvc\/edit#slide=id.g10a773dc4cc_0_2262\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/docs.google.com\/presentation\/d\/12iDT3CTPB0PsPaGZ4B0-aSsLCCameD6OG6cfwQBoJvc\/edit#slide=id.g10a773dc4cc_0_2262<\/a><\/li>\n\n\n\n<li>Zeek in Action: zeek2es.py \u2013 Zeek to Elasticsearch, Zeek\u2019s Blog, Jan 2022, <a href=\"https:\/\/zeek.org\/2022\/01\/31\/zeek-in-action-video-12-zeek2es\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/zeek.org\/2022\/01\/31\/zeek-in-action-video-12-zeek2es\/<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2021\n<ul class=\"wp-block-list\">\n<li>Detecting Log4j via Zeek &amp; LDAP Traffic, Corelight\u2019s Bright Ideas Blog, Dec 2021, <a href=\"https:\/\/corelight.com\/blog\/detecting-the-log4j-exploit-via-zeek-and-ldap-traffic\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/detecting-the-log4j-exploit-via-zeek-and-ldap-traffic<\/a><\/li>\n\n\n\n<li>Zeek in Action: A Radius Spicy Analyzer, Zeek\u2019s Blog, Dec 2021, <a href=\"https:\/\/zeek.org\/2021\/12\/03\/zeek-in-action-video-10-radius-protocol-analyzer-with-spicy\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/zeek.org\/2021\/12\/03\/zeek-in-action-video-10-radius-protocol-analyzer-with-spicy\/<\/a><\/li>\n\n\n\n<li>Corelight Sensors Detect the ChaChi RAT, Corelight\u2019s Bright Ideas Blog, Jun 2021, <a href=\"https:\/\/corelight.com\/blog\/corelight-sensors-detect-the-chachi-rat\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/corelight-sensors-detect-the-chachi-rat<\/a><\/li>\n\n\n\n<li>Detecting the Facefish Linux Rootkit with Zeek, Zeek\u2019s Blog, Jun 2021, <a href=\"https:\/\/zeek.org\/2021\/06\/10\/detecting-the-facefish-linux-rootkit-with-zeek\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/zeek.org\/2021\/06\/10\/detecting-the-facefish-linux-rootkit-with-zeek\/<\/a><\/li>\n\n\n\n<li>Pingback ICMP Tunneling Malware, Coreilght\u2019s Bright Idea Blog, May 2021, <a href=\"https:\/\/corelight.com\/blog\/pingback-icmp-tunneling-malware\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/pingback-icmp-tunneling-malware<\/a><\/li>\n\n\n\n<li>Zeek\u2019s IPSec Protocol Analyzer, Zeek\u2019s Blog, Apr 2021, <a href=\"https:\/\/zeek.org\/2021\/04\/20\/zeeks-ipsec-protocol-analyzer\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/zeek.org\/2021\/04\/20\/zeeks-ipsec-protocol-analyzer\/<\/a><\/li>\n\n\n\n<li>A Zeek OpenVPN Protocol Analyzer in Spicy, Apr 2021, <a href=\"https:\/\/zeek.org\/2021\/04\/08\/a-zeek-openvpn-protocol-analyzer-in-spicy\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/zeek.org\/2021\/04\/08\/a-zeek-openvpn-protocol-analyzer-in-spicy\/<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2020\n<ul class=\"wp-block-list\">\n<li>Give Me My Stats!, Corelight\u2019s Bright Ideas Blog, Sep 2020\n<ul class=\"wp-block-list\">\n<li>Part 1: <a href=\"https:\/\/corelight.com\/blog\/give-me-my-stats\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/corelight.com\/blog\/give-me-my-stats<\/a> <\/li>\n\n\n\n<li>Part 2: <a href=\"https:\/\/blog.zeek.org\/2019\/12\/how-to-add-jpeg-file-analyzer-to-zeek_19.html\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/blog.zeek.org\/2019\/12\/how-to-add-jpeg-file-analyzer-to-zeek_19.html<\/a> <\/li>\n\n\n\n<li>Part 3: <a href=\"https:\/\/blog.zeek.org\/2019\/12\/how-to-add-jpeg-file-analyzer-to-zeek_20.html\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/blog.zeek.org\/2019\/12\/how-to-add-jpeg-file-analyzer-to-zeek_20.html<\/a> <\/li>\n\n\n\n<li>Part 4 <a href=\"https:\/\/blog.zeek.org\/2019\/12\/how-to-add-jpeg-file-analyzer-to-zeek_23.html\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/blog.zeek.org\/2019\/12\/how-to-add-jpeg-file-analyzer-to-zeek_23.html<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Author, \u201cMalgazer: An Automated Malware Classifier With Running Window Entropy and Machine Learning\u201d, 2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ), Feb 2020; <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9042957\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/9042957<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2019\n<ul class=\"wp-block-list\">\n<li>How to Add a JPEG File Analzer to Zeek \u2013 Parts 1-4, Zeeks\u2019 blog, Dec 2019, <a href=\"https:\/\/zeek.org\/2019\/12\/06\/how-to-add-a-jpeg-file-analyzer-to-zeek-part-1\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/zeek.org\/2019\/12\/06\/how-to-add-a-jpeg-file-analyzer-to-zeek-part-1\/<\/a><\/li>\n\n\n\n<li>Author, \u201cMalgazer: An Automated Malware Classifier With Running Window Entropy and Machine Learning\u201d, Dakota State University, March 2019; PDF available at <a href=\"https:\/\/scholar.dsu.edu\/theses\/326\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/scholar.dsu.edu\/theses\/326\/<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2018\n<ul class=\"wp-block-list\">\n<li>Co-Author, \u201cAn Optimized Running Window Entropy Algorithm\u201d, National Cyber Summit (NCS), June 5-7, 2018 <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/85953\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/85953<\/a>38<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2015\n<ul class=\"wp-block-list\">\n<li>Contributing Author, \u201cEncyclopedia of Information Systems and Technology\u201d, Taylor &amp; Francis, December 2015<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2014\n<ul class=\"wp-block-list\">\n<li>Author, \u201cThe Current State of Expert Witnesses and Computer Forensics Part II \u2013 Some Basic Scientific Methodology and Statistics\u201d, July 8,2014 \u2018Threat Geek\u2019 General Dynamics Fidelis Cybersecurity Solutions Corporate Blog: <a href=\"http:\/\/www.threatgeek.com\/2014\/07\/the-current-state-of-expert-witnesses-and-computer-forensics-part-ii-some-basic-scientific-methodolo.html#more\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.threatgeek.com\/2014\/07\/the-current-state-of-expert-witnesses-and-computer-forensics-part-ii-some-basic-scientific-methodolo.html#more<\/a><\/li>\n\n\n\n<li>Author, \u201cThe Current State of Expert Witnesses and Computer Forensics: Part I \u2013 Where Did We Go Wrong?\u201d, May 8, 2014\u2018Threat Geek\u2019 General Dynamics Fidelis Cybersecurity Solutions Corporate Blog: <a href=\"http:\/\/www.threatgeek.com\/2014\/05\/the-current-state-of-expert-witnesses-and-computer-forensics-part-i-where-did-we-go-wrong.html\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.threatgeek.com\/2014\/05\/the-current-state-of-expert-witnesses-and-computer-forensics-part-i-where-did-we-go-wrong.html<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2013\n<ul class=\"wp-block-list\">\n<li>Author, \u201cKyrus at the FFIEC\u201d, September 20, 2013 Kyrus Tech, Inc. Corporate Blog: <a href=\"http:\/\/www.kyrus-tech.com\/kyrus-at-the-ffiec\/\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.kyrus-tech.com\/kyrus-at-the-ffiec\/<\/a><\/li>\n\n\n\n<li>Author, \u201cFTK\u2019s Reputation vs. FTK In Practice\u201d, September 16, 2013 Kyrus Tech, Inc. Corporate Blog: <a href=\"http:\/\/www.kyrus-tech.com\/ftks-reputation-vs-ftk-in-practice\/\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.kyrus-tech.com\/ftks-reputation-vs-ftk-in-practice\/<\/a><\/li>\n\n\n\n<li>Author, \u201cKyrus Completes Its First International Computer Forensics Class\u201d, September 5, 2013, Kyrus Tech, Inc. Corporate Blog: <a href=\"http:\/\/www.kyrus-tech.com\/kyrus-completes-its-first-international-computer-forensics-class\/\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.kyrus-tech.com\/kyrus-completes-its-first-international-computer-forensics-class\/<\/a><\/li>\n\n\n\n<li>Author, \u201cReview of SiQuest\u2019s Internet Examiner ToolKit v4\u201d, August 23, 2013 Kyrus Tech, Inc. Corporate Blog: <a href=\"http:\/\/www.kyrus-tech.com\/review-of-siquests-internet-examiner-toolkit-v4\/\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.kyrus-tech.com\/review-of-siquests-internet-examiner-toolkit-v4\/<\/a><\/li>\n\n\n\n<li>Author, \u201c3D Printing \u2013 The New Legal Frontier\u201d, July 24, 2013 Kyrus Tech, Inc. Corporate Blog: <a href=\"http:\/\/www.kyrus-tech.com\/3d-printing-the-new-legal-frontier\/\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.kyrus-tech.com\/3d-printing-the-new-legal-frontier\/<\/a><\/li>\n\n\n\n<li>Author, \u201cLaw Firms: Privilege Does Not Apply To Hackers\u201d, June 18, 2013, Kyrus Tech, Inc. Corporate Blog: <a href=\"http:\/\/www.kyrus-tech.com\/law-firms-privilege-does-not-apply-to-hackers\/\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.kyrus-tech.com\/law-firms-privilege-does-not-apply-to-hackers\/<\/a><\/li>\n\n\n\n<li>Co-Author, \u201cFive iPhone and iPad Security Steps to Take Right Now\u201d, April 18, 2013 American Bar Association\u2019s (ABA) Section of Litigation, Technology for the Litigator Committee (membership to the ABA required to view)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2012\n<ul class=\"wp-block-list\">\n<li>Author, \u201cJDA, Along with Alaska\u2019s Famous Female Flyers, Help Non-Profit Girls With Wings Deliver!\u201d JD&amp;A Corporate blog: JonesDykstra.com, June 11, 2012<\/li>\n\n\n\n<li>Co-Author, \u201cNon-Profit Girls With Wings Soars North with Support from Alaska\u2019s Famous Female Flyers\u201d PRWeb Press Release, June 8, 2012: <a href=\"http:\/\/www.prweb.com\/releases\/2012\/6\/prweb9586319.htm\" target=\"_blank\" rel=\"noopener\" title=\"\">http:\/\/www.prweb.com\/releases\/2012\/6\/prweb9586319.htm<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2011\n<ul class=\"wp-block-list\">\n<li>Author, \u201cCasey Anthony Murder Trial: The Computer Evidence (Part 5)\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Jul. 2, 2011<\/li>\n\n\n\n<li>Author, \u201cCasey Anthony Murder Trial: The Computer Evidence (Part 4)\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Jun. 23, 2011<\/li>\n\n\n\n<li>Author, \u201cCasey Anthony Murder Trial: The Computer Evidence (Part 3)\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Jun. 19, 2011<\/li>\n\n\n\n<li>Author, \u201cCasey Anthony Murder Trial: The Computer Evidence (Part 2)\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Jun. 14, 2011<\/li>\n\n\n\n<li>Author, \u201cCasey Anthony Murder Trial: The Computer Evidence (Part 1)\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Jun. 13, 2011<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2010\n<ul class=\"wp-block-list\">\n<li>Co-Author, \u201cHow Secure Is Your PDF?\u201d Law.com, Jan. 19, 2010<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2009\n<ul class=\"wp-block-list\">\n<li>Author, \u201cVisual Computer Forensic Analysis.\u201d Law.com, Feb. 17, 2009<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2008\n<ul class=\"wp-block-list\">\n<li>Author, \u201cAre Passwords Protected by the Fifth Amendment?\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Feb. 11, 2008<\/li>\n\n\n\n<li>Author, \u201cSome of my Thoughts on E-Discovery versus Computer Forensics.\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Apr. 29, 2008<\/li>\n\n\n\n<li>Co-Author, \u201cLegal Tracks on Black Hat Briefings.\u201d Law.com, July 31, 2008<\/li>\n\n\n\n<li>Co-Author, \u201cBlack Hat 2008 Aftermath.\u201d Law.com, Aug. 20, 2008<\/li>\n\n\n\n<li>Co-Author, \u201cThe EDD Expert Witness: Choose Carefully.\u201d The National Law Journal &amp; Law.com, Aug. 26 2008<\/li>\n\n\n\n<li>Co-Author, &#8220;Making Sense of Computer Forensics.&#8221; Litigation Support Today, Aug.-Oct. 2008<\/li>\n\n\n\n<li>Author, \u201cOld Habits Persist in Virtual Security.\u201d Law.com, Nov. 17, 2008<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2007\n<ul class=\"wp-block-list\">\n<li>Author, \u201cThe Real World of Computer Forensics.\u201dInformation Week\u2019s Optimize Magazine, Jan. 2007<\/li>\n\n\n\n<li>Author, \u201cThe Real World of Computer Forensics.\u201d Information Week\u2019s Optimize Magazine, Feb. 13, 2007<\/li>\n\n\n\n<li>Author, \u201cFedora Core 6, FreeRADIUS, Linksys Wireless Routers, and WPA2-Enterprise Working Together\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Mar. 1, 2007<\/li>\n\n\n\n<li>Author, \u201cNational Computer Forensic Institute Unveiled\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Mar. 13, 2007<\/li>\n\n\n\n<li>Author, \u201cTwo External Hard Drive Enclosures That Get A Thumbs Up.\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Mar. 15, 2007<\/li>\n\n\n\n<li>Author, \u201cGot Open Source?\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Mar. 20, 2007<\/li>\n\n\n\n<li>Author, \u201cReview of \u2018The Eight E\u2019s:\u2019 Ascending the Computer Forensic Ladder.\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Mar. 21, 2007<\/li>\n\n\n\n<li>Author, \u201cInevitable Corporate Incidents, How to Bite Them Back!\u201d Information Week\u2019s Optimize Magazine, Mar. 2007<\/li>\n\n\n\n<li>Author, \u201cLaw.com \u2013 Shield Your Firm from Cybercrime Wednesday.\u201d JD&amp;A Corporate Blog: JonesDykstra.com, Apr. 4, 2007<\/li>\n\n\n\n<li>Author, \u201cHow To Come Back From A Cyber Attack\u201d, Information Week\u2019s Optimize Magazine, Apr. 2007<\/li>\n\n\n\n<li>Author, \u201cBogus Computer Expert goes from Witness to Federal Prisoner.\u201d JD&amp;A Corporate Blog: JonesDykstra.com, May 14, 2007<\/li>\n\n\n\n<li>Author, \u201cComputer Forensics Catches a Criminal.\u201d Law.com, May 2007<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2005\n<ul class=\"wp-block-list\">\n<li>Co-Author, \u201cWeb Browser Forensics, Part 1.\u201d SecurityFocus.com, Mar. 30, 2005<\/li>\n\n\n\n<li>Co-Author, \u201cWeb Browser Forensics, Part 2.\u201d SecurityFocus.com, May 11, 2005<\/li>\n\n\n\n<li>Author, \u201cReal Digital Forensics: Computer Security and Incident Response.\u201d Addison-Wesley, Sept. 2005<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2003\n<ul class=\"wp-block-list\">\n<li>Author, \u201cForensic Analysis of Internet Explorer Activity Files.\u201d Foundstone.com, Mar. 2003<\/li>\n\n\n\n<li>Author, \u201cForensic Analysis of Microsoft Windows Recycle Bin Records.\u201d Foundstone.com, Apr. 2003<\/li>\n\n\n\n<li>Author, \u201cForensic Analysis of Microsoft Internet Explorer Cookie Files.\u201d Foundstone.com, May 2003<\/li>\n\n\n\n<li>Technical Editor, \u201cIncident Response: Investigating Computer Crime.\u201d 2nd Edition. McGraw-Hill, 2003<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2002\n<ul class=\"wp-block-list\">\n<li>Author, \u201cIncident Response, die richtige Reaktion auf einen Einbruch.\u201d Linux New Media AG: LinuxNewMedia.de, Mar. 2002<\/li>\n\n\n\n<li>Author, \u201cAnti-Hacker Tool Kit.\u201d McGraw-Hill, 2002<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>2001\n<ul class=\"wp-block-list\">\n<li>Contributing Author, \u201cHacker\u2019s Challenge.\u201d FDIC-Insecured, Osborne-McGraw Hill, Oct. 2001<\/li>\n\n\n\n<li>Author, \u201cIncident Response: Performing Investigations on a Live Host.\u201d :login; a USENIX Publication, Security Edition, Fall 2001<\/li>\n\n\n\n<li>Author, \u201cLoadable Kernel Modules: The New Frontier for Incident Response.\u201d :login; a USENIX Publication, Security Edition, Fall 2001<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>1999\n<ul class=\"wp-block-list\">\n<li>Co-Author, &#8220;Improved Emission Tomography via Multiscale Sinogram Analysis&#8221; IEEE International Conference on Acoustics, Speech, and Signal Processing, Phoenix, AZ; Mar. 15-19, 1999<\/li>\n\n\n\n<li>Author, &#8220;Adaptive Wavelet-Domain Digital Image Watermarking: A Detection-Theoretic Approach.&#8221; Master thesis for Michigan State University, May 1999<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Books Articles, Blogs, Books, and Webinars<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-231","page","type-page","status-publish","hentry"],"aioseo_notices":[],"jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/drkeithjones.com\/index.php\/wp-json\/wp\/v2\/pages\/231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drkeithjones.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/drkeithjones.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/drkeithjones.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/drkeithjones.com\/index.php\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":0,"href":"https:\/\/drkeithjones.com\/index.php\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"wp:attachment":[{"href":"https:\/\/drkeithjones.com\/index.php\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}