30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Casey, E. (2000). Digital Evidence and Computer Crime (1 ed.). London: Academic<br />

Press.<br />

Casey, E. (2004). Digital Evidence and Computer Crime: <strong>Forensic</strong> Science,<br />

Computers, and the Internet (Vol. 2). London: Academic Press.<br />

Casey, E. (2006). Investigating sophisticated security breaches. Communication <strong>of</strong><br />

ACM, 49(2), 48.<br />

Ciardhuain, S. O. (2004). An Extended Model <strong>of</strong> Cybercrime Investigations.<br />

International Journal <strong>of</strong> Digital Evidence, 3(1).<br />

Cohen, F. B. (2010). Fundamentals <strong>of</strong> Digital <strong>Forensic</strong> Evidence. In Handbook <strong>of</strong><br />

In<strong>for</strong>mation and Communication Security (pp. 789-808). Berlin Heidelberg:<br />

Springer.<br />

Cohen, T., & Schroader, A. (2007). Alternate data storage <strong>for</strong>ensics. Burlington:<br />

Syngress.<br />

Comella-Dorda, S., Dean, J., Lewis, G., Morris, E., Oberndorf, P., & Harper, E. (2002).<br />

A process <strong>for</strong> COTS s<strong>of</strong>tware product evaluation. Paper presented at the<br />

Proceedings <strong>of</strong> the First International Conference on COTS-Based S<strong>of</strong>tware<br />

Systems.<br />

Dan, M., Anna, C., Steve, R., Alain, G., Matthew, K., & Jeremy, T. (2007). Is the<br />

Open Way a Better Way? Digital <strong>Forensic</strong>s Using Open Source <strong>Tools</strong>. Paper<br />

presented at the System Sciences, 2007. HICSS 2007. 40th Annual Hawaii<br />

International Conference on.<br />

DarkNet. (2006). 10 Best Security Live CD Distros. Retrieved 23rd March, 2010, from<br />

http://www.darknet.org.uk/2006/03/10-best-security-live-cd-distros-pen-test<strong>for</strong>ensics-recovery/<br />

Detective, D. (2010). Introduction to Digital Detective's NetAnalysis v1.51. Retrieved<br />

1 st Feb, 2010, from http://www.digital-detective.co.uk/netanalysis.asp<br />

DIBS. (2010). Computer <strong>for</strong>ensics equipment. Retrieved 20th, Mar, 2010, from<br />

http://www.computer-evidence.com/products/products.asp<br />

Dixon, P. D. (2005). An overview <strong>of</strong> computer <strong>for</strong>ensics. IEEE Potentials, 24(5), 7-10.<br />

DFRWS. (2001). A Road Map <strong>for</strong> Digital <strong>Forensic</strong> Research. New York, U.S.A.<br />

E-fence. (2009). Helix3 pro. Retrieved 1st, Feb, 2010, from<br />

http://www.e-fense.com/helix3pro.php<br />

123

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!