25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

iFrame. (2008). Hash Calculator. Accessed 7 th 5 2008 from URL:<br />

http://iframe.in/hash-calculator/<br />

Kent, K. <strong>and</strong> Souppaya, M. (2006). Guide to Computer Security <strong>Log</strong> Management<br />

National Institute <strong>of</strong> St<strong>and</strong>ards <strong>and</strong> Technology<br />

Kessler (2004). An Overview <strong>of</strong> Steganography for <strong>the</strong> Computer Forensics Examiner<br />

Forensic Science Communications<br />

Liu, V. (2005). Metasploit antiforensics project Metaspolit<br />

Micros<strong>of</strong>t Corporation (2007). Net start. Retrieved November 26, 2007 from URL:<br />

http://technet2.micros<strong>of</strong>t.com/<strong>Windows</strong>Server/en/library/6c0a1e0b-ea5d-<br />

4a38-9682-944d17cfe11c1033.mspx<br />

Micros<strong>of</strong>t Corporation (2008). FileSystemWatcher Class. Accessed 21 st April 2008.<br />

URL: http://msdn2.micros<strong>of</strong>t.com/enus/library/system.io.filesystemwatcher.aspx<br />

Murphy, J. (2006). Forensic Readiness Dexisive Inc<br />

Nair, SK. Gamage, C. Dasti, MT. Crispo, B <strong>and</strong> Tanenbaum, AS (2006). Countering<br />

Digital Forensics: An Identity Based Ephemerizer Cryptosystem Vrije<br />

Universiteit<br />

NIST (2006). Forensic Techniques: Helping organisations improve <strong>the</strong>ir responses to<br />

information security incidents. National Institute <strong>of</strong> St<strong>and</strong>ards <strong>and</strong> Technology<br />

NIST (2006). <strong>Log</strong> Management: Using computer <strong>and</strong> network records to improve<br />

information security. National Institute <strong>of</strong> St<strong>and</strong>ards <strong>and</strong> Technology<br />

OED. (2008). Dictionary Facts. Retrieved 7 th May 2008 from URL:<br />

http://www.oed.com/about/facts.html<br />

Palmer, G. (2001). A Road Map for Digital Forensics Research Digital Forensic<br />

Research Workshop<br />

71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!