30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Newsham, T., Palmer, C., Stamos, A., & Burns, J. (2007). Breaking <strong>for</strong>ensics s<strong>of</strong>tware:<br />

weaknesses in critical evidence collection. Retrieved 3 rd , Mar 2010 from<br />

https://www.isecpartners.com/files/iSEC-Breaking_<strong>Forensic</strong>s_S<strong>of</strong>tware-<br />

Paper.v1_1.BH2007.pdf<br />

US-CERT. (2007). Vulnerabilitiy Note VU#310057. Retrieved 9th, Mar, 2010, from<br />

http://www.kb.cert.org/vuls/id/310057<br />

NFI. (2006). rdd <strong>for</strong>ensic copy program. Retrieved 4th May, 2010, from<br />

http://source<strong>for</strong>ge.net/projects/rdd/files/<br />

NIJ. (2001). Electronic crime scene investigation: a guide <strong>for</strong> first responders.<br />

Washington, DC.<br />

NIJ. (2008). Electronic crime scene investigation: a guide <strong>for</strong> first responders. 2ed.<br />

Washington, DC.<br />

NIJ. (2008a). Test Results <strong>for</strong> Digital <strong>Data</strong> Acquisition Tool: FTK Imager 2.5.3.14.<br />

Washington, DC: National Institute <strong>of</strong> Standards and Technology. Retrieved from<br />

21 st January 2010 http://www.ojp.usdoj.gov/nij/pubs-sum/222982.pdf<br />

Nikkel, B. J. (2009). <strong>Forensic</strong> analysis <strong>of</strong> GPT disks and GUID partition tables.<br />

Digital Investigation, 6, 39-47.<br />

NIST. (2001). General test methodology <strong>for</strong> computer <strong>for</strong>ensic tools. Retrieved from<br />

http://www.cftt.nist.gov/Test%20Methodology%207.doc<br />

NIST. (2004). Digital <strong>Data</strong> Acquisition Tool Specification (Draft 1 <strong>of</strong> Version 4.0).<br />

Washington, DC: NIST. Retrieved 21st January 2010 from<br />

http://www.cftt.nist.gov/Pub-Draft-1-DDA-Require.pdf<br />

NIST. (2005). Digital <strong>Data</strong> Acquisition Tool Test Assertions and Test Plan (Draft 1 <strong>of</strong><br />

Version 1.0). Washington, DC: NIST. Retrieved from 21st January 2010<br />

http://www.cftt.nist.gov/DA-ATP-pc-01.pdf<br />

Noblett, M., Pollitt, M., & Presley, L. (2000). Recovering and Examining Computer<br />

<strong>Forensic</strong> Evidence. <strong>Forensic</strong> science communications, 2(4), 13.<br />

Oliver, S. (2010). Apple's new MacBook Airs predicted to sell 700K during holidays.<br />

Retrieved 24th Oct, 2010, from<br />

http://www.appleinsider.com/articles/10/10/22/apples_new_macbook_air_predict<br />

ed_to_sell_700k_during_holidays.html<br />

Palmer, G. (2001). A Road Map <strong>for</strong> Digital <strong>Forensic</strong> Research (No. DTR - T001-01).<br />

New York.<br />

127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!