30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

References<br />

Access<strong>Data</strong> (2007). <strong>Forensic</strong> Toolkit Imager User Guide. 1-34. Retrieved from<br />

http://www.accessdata.com/downloads/media/en_us/print/manuals/ImagerUsersG<br />

uide.pdf<br />

Access<strong>Data</strong>. (2009). <strong>Forensic</strong> Toolkit 3 product features. Retrieved 15th, Mar, 2010,<br />

from http://www.accessdata.com/<strong>for</strong>ensictoolkit.html<br />

Access<strong>Data</strong>. (n.d). FTK Imager 2.x Release Notes. Retrieved 18th, Mar, 2010, from<br />

http://www.accessdata.com/downloads/media/Imager_2.x_ReleaseNotes.pdf<br />

Adams, C. W. (2008). Legal issues pertaining to the development <strong>of</strong> digital <strong>for</strong>ensic<br />

tools. Paper presented at the Proceedings - SADFE 2008 3rd International<br />

Workshop on Systematic Approaches to Digital <strong>Forensic</strong> Engineering, Berkeley,<br />

CA.<br />

Akhter, F. (2008). E-Commerce Security: The Categorical Role <strong>of</strong> Computers in<br />

<strong>Forensic</strong> Online Crime In Intelligence and Security In<strong>for</strong>matics (Vol. 5075).<br />

Berlin: Springer.<br />

Al-Azhar, M. N. (2009). <strong>Forensic</strong>ally Sound Write Protect on Ubuntu <strong>Forensic</strong> Cop<br />

Journal, 1(3).<br />

Antonellis, C. J. (2008). Solid state disks and computer <strong>for</strong>ensics. Journal <strong>of</strong><br />

In<strong>for</strong>mation Systems Security Association, 2008(July), 36-38.<br />

Ayers, D. (2009). A second generation computer <strong>for</strong>ensic analysis system. Digital<br />

Investigation, 6(Supplement 1), S34-S42.<br />

Ayers, D. (2009a). Flaws found in „EnCase®‟ computer <strong>for</strong>ensic s<strong>of</strong>tware. NZ Lawyer<br />

(111).<br />

AtlanticLinux. (2009). Ubuntu 9.04 Fake RAID problems. Retrieved 10th Oct, 2010,<br />

from http://atlanticlinux.ie/blog/?tag=dmraid<br />

Balzanto, T. (2010). Error: Can't Initialize Source. Retrieved 10th Oct, 2010, from<br />

http://www.efense.com/<strong>for</strong>ums/showthread.php?t=346&highlight=source+initialise<br />

Barbara, J. J. (2006). Digital Insider: S<strong>of</strong>tware Imaging/Analysis <strong>Tools</strong>, Part 1.<br />

<strong>Forensic</strong> Magazine.<br />

Baryamureeba, V., & Tushabe, F. (2004). The enhanced digital investigation process<br />

model. Paper presented at the Digital <strong>Forensic</strong> Research Workshop.<br />

121

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!