25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

Panigrahi, P. (2006). Discovering Fraud in Forensic Accounting Using Data Mining<br />

Techniques The Chartered Accountant<br />

Postnote (2006) Computer Crime Parliamentary Office <strong>of</strong> Science <strong>and</strong> Technology.<br />

Issue 271<br />

Rogers, M. (2005). Hard Challenges for Digital Forensics<br />

http://www.mser.gov.bc.ca/privacyaccess/Conferences/Feb2005/ConfPresenta<br />

tions/Marcus_Rogers.pdf [accessed 26th November 2007]<br />

Westphal, K (2001) Secure Remote <strong>Log</strong> Servers Using SCP<br />

http://www.securityfocus.com/infocus/1394 [accessed 27th November 2007]<br />

Wikipedia (2008). Unix Time. Accessed 21 st April 2008. URL:<br />

http://en.wikipedia.org/wiki/Unix_time<br />

72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!