12.11.2012 Views

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6 Casey Eoghan et al (2009) Investigation delayed is justice denied:<br />

proposals for expediting forensic examinations <strong>of</strong> digital evidence, in<br />

Journal <strong>of</strong> Forensic Science Nov 2009, Vol 54 No 6 p 1353.<br />

7 Casey Eoghan et al (2009) Investigation delayed is justice denied:<br />

proposals for expediting forensic examinations <strong>of</strong> digital evidence, in<br />

Journal <strong>of</strong> Forensic Science Nov 2009, Vol 54 No 6 p 1353<br />

8 Harris, Gretchen (2009) Metadata: High-Tech Invisible Ink Legal<br />

Considerations, in Mississippi Law Journal Summer 2009, p 939.<br />

9 Dennis Browning, Gary C Kessler. The Journal <strong>of</strong> Digital Forensics,<br />

Security and Law : JDFSL. Farmville: 2009. Vol. 4, Iss. 2; pg. 57<br />

10 Dennis Browning, Gary C Kessler. The Journal <strong>of</strong> Digital Forensics,<br />

Security and Law : JDFSL. Farmville: 2009. Vol. 4, Iss. 2; pg. 57<br />

11 Daisuke Takahashia, Yang Xiaoa, Yan Zhangb, Periklis Chatzimisiosc<br />

and Hsiao-Hwa Chend, User Fingerprinting and its Applications for<br />

Intrusion Detec<strong>to</strong>r, Department <strong>of</strong> Computer Science, The University <strong>of</strong><br />

Alabama 1/<strong>2010</strong><br />

12 Daisuke Takahashia, Yang Xiaoa, Yan Zhangb, Periklis Chatzimisiosc<br />

and Hsiao-Hwa Chend, User Fingerprinting and its Applications for<br />

Intrusion Detec<strong>to</strong>r, Department <strong>of</strong> Computer Science, The University <strong>of</strong><br />

Alabama 1/<strong>2010</strong><br />

13 Dr Glen Dardick, Pr<strong>of</strong>essor <strong>of</strong> Information Systems, Longwood<br />

University, USA: The Increasing Sophistication <strong>of</strong> Technology Users:<br />

The Case for Counter Anti-Forensics Training, presentation at the<br />

International Workshop on E Forensics Law Adelaide 19 January<br />

2009.<br />

14 http://www.truecrypt.org/ accessed 13 May <strong>2010</strong>.<br />

15 http://www.truecrypt.org/statistics accessed 13 May <strong>2010</strong>.<br />

16 Fortea, David (2009) Do Encrypted Discs Spell the End <strong>of</strong> Forensics,<br />

in Computer Fraud and Security Volume 2009, No. 2 p 18.<br />

17 Behr, Darrin J, (2008) Anti-Forensics: What is it, What it Does, and<br />

Why You Need <strong>to</strong> Know, in New Jersey Lawyer, December 2008, p 10.<br />

18 Behr, Darrin J, (2008) Anti-Forensics: What is it, What it Does, and<br />

Why You Need <strong>to</strong> Know, in New Jersey Lawyer, December 2008, p 10<br />

19 Behr, Darrin J, (2008) Anti-Forensics: What is it, What it Does, and<br />

Why You Need <strong>to</strong> Know, in New Jersey Lawyer, December 2008, p 10<br />

20 Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth. The<br />

Impact <strong>of</strong> Hard Disk Firmware Steganography on Computer Forensics,<br />

inThe Journal <strong>of</strong> Digital Forensics, Security and Law : JDFSL.<br />

Farmville: 2009. Vol. 4, Iss. 2; pg. 73<br />

21 Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth. The<br />

Impact <strong>of</strong> Hard Disk Firmware Steganography on Computer Forensics,<br />

inThe Journal <strong>of</strong> Digital Forensics, Security and Law : JDFSL.<br />

Farmville: 2009. Vol. 4, Iss. 2; pg. 73<br />

22 Kuncik, Noemi and Harbison, Andy, (<strong>2010</strong>) Counter Forensics and the<br />

Push <strong>to</strong> Stay Ahead <strong>of</strong> the Game, in Digital Forensics Magazine No 2,<br />

p 19 .<br />

414

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!