Analysis and Evaluation of the Windows Event Log - Bill Buchanan
Analysis and Evaluation of the Windows Event Log - Bill Buchanan
Analysis and Evaluation of the Windows Event Log - Bill Buchanan
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Barrie Codona, BSc (Hons) Network Computing, 2007<br />
8 References<br />
Alles, MG. Kogan, A. <strong>and</strong> Vasarhelyi, MA (2004) Restoring auditor credability:<br />
tertiary monitoring <strong>and</strong> logging <strong>of</strong> continuous assurance systems. Elsevier Inc.<br />
Armour Forensics (2005) Master File Table Defined URL: http://www.forensicsintl.com/def11.html<br />
[Accessed 29th November 2007]<br />
Baryamureeba, V. <strong>and</strong> Tushabe, F. (2004) The Enhanced Digital Investigation<br />
Process Model Digital Forensic Research Workshop<br />
Brown, CLT. (2005). Computer Evidence Collection <strong>and</strong> Preservation Charles River<br />
Media<br />
Carrier, B. <strong>and</strong> Spafford E. (2004) An <strong>Event</strong>-Based Digital Forensic Investigation<br />
Framework. Purdue University<br />
CodeProject. (2008). Public Key RSA Encryption in C# .NET. Accessed 7 th 5 2008<br />
from URL: http://www.codeproject.com/KB/security/RSACryptoPad.aspx<br />
Cohen, F. (2006) Challenges to Digital Forensic Evidence Fred Cohen <strong>and</strong> Associates<br />
Forte, D <strong>and</strong> Power, R. (2007) A Tour Through The Realms <strong>of</strong> Anti-Forensics Elsevier<br />
Inc.<br />
Forte, D. (2005). <strong>Log</strong> management for effective incident response Network Security.<br />
Forte, D. (2004). The ‘Art’ <strong>of</strong> <strong>Log</strong> File Correlation Elsevier Ltd<br />
Gladyshev (2004) Formalising <strong>Event</strong> Reconstruction in Digital Investigations<br />
http://www.gladyshev.info/publications/<strong>the</strong>sis/chapter3.pdf [Accessed 27th<br />
November 2007]<br />
Harris, Ryan (2006). Arriving at an anti-forensics consensus: Examining how to<br />
define <strong>and</strong> control <strong>the</strong> anti-forensics problem Purdue University<br />
70