30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Smith, R. (2009). Make the most <strong>of</strong> large drives with GPT and Linux. Retrieved 9 th<br />

Sep 2010 from http://www.ibm.com/developerworks/linux/library/l-gpt/<br />

Sommer, P. (2010). <strong>Forensic</strong> science standards in fast-changing environments Science<br />

and Justice, 50(1), 12-17.<br />

Sourcefire. (2010). What is Snort? Retrieved 3rd, Mar, 2010, from http://www.snort.org/<br />

Staarfanger. P. (2009). Helix3Pro Receiver Failures. Retrieved 1st Oct 2010 from<br />

http://www.efense.com/<strong>for</strong>ums/showthread.php?t=350&highlight=source+initialise<br />

Stephenson, P. (2003). A comprehensive approach to digital incident investigation.<br />

In<strong>for</strong>mation Security Technical Report, 8(2), 42-54.<br />

SWGDE (2009). SWGDE and SWGIT Digital & Multimedia Evidence Glossary.<br />

Retrieved 21st March 2010 from<br />

http://www.swgde.org/documents/swgde2009/SWGDE_SWGITGlossaryV2.3.pd<br />

f<br />

SWGDE (2009a). SWGDE Recommended Guidelines <strong>for</strong> Validation Testing.<br />

Retrieved 3rd March 2010 from<br />

http://www.swgde.org/documents/swgde2009/SWGDE%20Validation%20Guidel<br />

ines%2001-09.pdf<br />

Technical Committee T13. (2001). AT Attachment with packet interface-6<br />

(ATA/ATAPI-6). Retrieved 14th Apr, 2010, from<br />

http://www.t10.org/t13/project/d1410r3a-ATA-ATAPI-6.pdf<br />

Thompson, E. (2005). MD5 collisions and the impact on computer <strong>for</strong>ensics. Digital<br />

Investigation, 2, 36-40.<br />

Vatis, M. (2004). Law en<strong>for</strong>cement tools and technologies <strong>for</strong> investigating cyber<br />

attacks: Gap analysis report: Institute <strong>for</strong> security technology studies.<br />

Viega, J. (2000). The Myth <strong>of</strong> Open Source Security. Retrieved 21st January 2010<br />

from http://itmanagement.earthweb.com/secu/article.php/621851<br />

Wallace, D. R., & Fujii, R. U. (1989). S<strong>of</strong>tware verification and validation: an<br />

overview. IEEE S<strong>of</strong>tware, 6(3), 10-17.<br />

Wang, X., Feng, D., Lai, X., & Yu, H. (2004). Collisions <strong>for</strong> hash functions MD4,<br />

MD5, HAVAL-128 and RIPEMDSpringer. Symposium conducted at the meeting<br />

<strong>of</strong> the Crypto 2004, Santa Barbara, Cali<strong>for</strong>nia.<br />

Wang, X., Lai, X., Feng, D., Chen, H., & Yu, X. (2005). Cryptanalysis <strong>of</strong> the Hash<br />

Functions MD4 and RIPEMD. In R. Cramer (Chair), Springer. Symposium<br />

130

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!