Tisa mobile forensic
Linux Memory Analysis with Volatility
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced Malware
Unmasking Careto through Memory Forensics (video in description)
CDAC Presentation
CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords.
The Beginners Guide to the Internet Underground