Crosby-Signed Thesis - Alliance Digital Repository
Crosby-Signed Thesis - Alliance Digital Repository
Crosby-Signed Thesis - Alliance Digital Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
IMPACT OF IPV6 TRANSITION MECHANISMS ON THE NETWORK FORENSIC<br />
136<br />
Convery, S., & Miller, D. (2004). IPv6 and IPv4 threat comparison and best-practice evaluation<br />
(v1.0): Cisco Systems. Retrieved from<br />
http://www.cisco.com/web/about/security/security_services/ciag/documents/v6-v4<br />
threats.pdf<br />
Cooper, M., & Yen, D. C. (2005). IPv6: business applications and implementation concerns.<br />
Computer Standards & Interfaces, 28(1), 27-41. doi: 10.1016/j.csi.2004.11.001<br />
Cowan, A. L. (2007, Feb 14). Teacher Faces Jail Over Pornography on Class Computer, New<br />
York Times.<br />
daemon9. (1997, Sept). LOKI2: The Implementation. Phrack Magazine, 7(51).<br />
Daubert v. Merrell Dow Pharmaceuticals Inc., 579 (U.S 1993). Retrieved from<br />
http://www.law.cornell.edu/supct/html/92-102.ZS.html<br />
Davies, E..Krishnan, S., & Savola, P. (2007). IPv6 transition/coexistence security<br />
considerations. RFC 4942: Internet Engineering Task Force (IETF).<br />
Davies, J. (2008). Understanding IPv6 (2nd ed.): Microsoft Press.<br />
Deering, S..Haberman, B..Jinmei, T..Nordmark, E., & Zill, B. (2005). IPv6 Scoped Address<br />
Architecture. RFC 4007: Internet Engineering Task Force (IETF).<br />
DistroWatch.com. (n.d.). Netsonic.com. Retrieved Dec 14, 2010, from http://distrowatch.com/<br />
Dobrucki, M. (1999). The effects of the transition to IPv6 on Internet security.<br />
Durand, A..Fasano, P..Guardini, I., & Lento, D. (2001). IPv6 tunnel broker. RFC 3053: Internet<br />
Engineering Task Force (IETF).<br />
Electronic crime scene investigation: A guide for first responders. (2001). Technical Working<br />
Group for Electric Crime Scene Investigation.