[bib-03] "Data Hiding Tactics for Windows and UNIX File Systems." Identity Theft and Financial Fraud Research and Operation Center, May 26, 2006. http://www.berghel.net/publications/data_hiding/data_hiding.php (accessed June 1, 2010).
, , and .[bib-04] CSO, June 8, 2007. http://www.csoonline.com/article/221208/The_Rise_of_Anti_Forensics (accessed May 20, 2010).
. "The Rise of Anti-Forensics."[bib-05] Government Computer News, August 19, 2009. http://gcn.com/articles/2009/08/24/it-forensics-tools-tech-strategies.aspx (accessed June 15, 2010).
. "Forensics Tools Can Help Stop Threats to Ever-Expanding Networks."[bib-06]
, and . "On Locational Privacy, and How to Avoid Losing It Forever." Electronic Frontier Foundation, August 2009. http://www.eff.org/files/eff-locational-privacy.pdf (accessed June 11, 2010).[bib-07] The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System. Boston: Wordware Publishing, Inc., 2009, pp. 496-498.
.[bib-08] Collecting Electronic Evidence After a System Compromise. Bethesda, MD: The SANS Institute, 2005.
.[bib-09]
. "Forensic Examination of a RIM (BlackBerry) Wireless Device." June 2002. http://www.rh-law.com/ediscovery/Blackberry.pdf (accessed June 11, 2010).[bib-10] An Event-Based Digital Forensic Investigation Framework. West Lafayette, IN: Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University. Presented at DFRWS 2004.
, and .[bib-11] CBS News. "Cyberbully Mom Guilty of Lesser Charge." CBS News, November 26, 2008. http://www.cbsnews.com/stories/2008/11/26/national/main4635346.shtml (accessed May 14, 2010).
[bib-12] Journal of Behavioral Profiling Vol. 1, No. 1, January 2000.
, and . "Evidence Dynamics: Locard's Exchange Principle and Crime Reconstruction."[bib-13]
. "Linux Data Hiding and Recovery." Guardian Digital, Inc., 2010. http://www.linuxsecurity.com/content/view/117638/49/ (accessed May 21, 2010).[bib-14] Cyberwar: The Next Threat to National Security and What to Do About It. New York: HarperCollins, 2010.
, and .[bib-15] Committee on Identifying the Needs of the Forensic Sciences Community and National Research Council. Strengthening Forensic Science in the United States: A Path Forward. Washington, DC: National Academies Press, 2009, pp. 5-41.
[bib-16] Computer Forensic Services. Data Analysis & Recovery. Minnetonka, MN: Computer Forensic Services, Inc., 2006.
[bib-17] "Computer Forensics Recruiter Provides Career Information in the Computer Forensics Field with the Best and Latest Education Resources and Schools." Information Engineer Technology News, March 7, 2010. http://www.informationengineer.org/2010/03/06/computer-forensics-recruiter-provides-career-information-in-the-computer-forensics-field-with-the-best-and -latest-education-resources-and-schools.html (accessed July 8, 2009).
[bib-18] Computer Forensics UK Ltd. DIVA Computer Evidence—Digital Image Verification and Authentication. Warwickshire, England: Computer Forensics UK Ltd., 2005.
[bib-19] Internetnews.com, April 8, 2010. http://www.internetnews.com/security/article.php/3875471/Massive-Cyber-Spy-Ring-Seen-Operating-in-China.htm (accessed June 11, 2010).
. "Massive Cyber Spy Ring Seen Operating in China."[bib-20] ________. "Report Alleges Vast Cyber Crime Syndicate in China." eSecurity Planet, April 7, 2010. http://www.esecurityplanet.com/news/article.php/3875281/Report-Alleges-Vast-Cyber-Crime-Syndicate-in-China.htm (accessed May 14, 2010).
[bib-21] Cornell University Law School. Computer Fraud and Abuse Act. Cornell University Law School, January 5, 2009. http://www.law.cornell.edu/uscode/18/1030.html (accessed June 11, 2010).
[bib-22] Tech Republic, May 4, 2010. http://blogs.techrepublic.com.com/datacenter/?p=2579&tag=nl.e040 (accessed May 20, 2010).
. "How Databases Connect to the Arrest of Faisal Shahzad."[bib-23] Economy Watch. "Porn Industry, Porn Trade, Adult Entertainment Industry." Economy Watch, n.d. http://www.economywatch.com/world-industries/porn-industry.html (accessed May 20, 2010).
[bib-24] Federal Bureau of Investigation. 2008 Computer Crime and Security Survey. Washington, DC: FBI, 2008.
[bib-25] Digital Forensics: Methods and Tools for Retrieval and Analysis of Security Credentials and Hidden Data. Trondheim, Norway: Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://pogostick.net/~andreas/ (accessed June 14, 2010).
.[bib-27]
. "FAQ: Firewall Forensics (What Am I Seeing?)," version 0.3.0. LinuxSecurity.com, January 15, 2000. http://www.linuxsecurity.com/resource_files/firewalls/firewall-seen.html (accessed June 11, 2010).[bib-28] Investigations Involving the Internet and Computer Networks, NCJ 210798. Washington, DC: U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, January 2007. http://www.ncjrs.gov/pdffiles1/nij/210798.pdf (accessed June 15, 2010).
, , and .[bib-29] Security Week, April 26, 2010. http://www.securityweek.com/content/five-a%E2%80%99s-make-cybercrime-so-attractive (accessed May 14, 2010).
. "The Five As That Make Cybercrime so Attractive."[bib-31]
, and . "iPhone Forensics." viaForensics, June 2009. http://viaforensics.com/services/iphone-forensics/ (accessed June 11, 2010).[bib-32] Internet Crime Complaint Center (IC3). "2009 Internet Crime Report." Internet Crime Complaint Center, n.d. http://www.ic3.gov/media/annualreports.aspx (access June 11, 2010).
[bib-33] The New York Times, April 26, 2010. http://www.nytimes.com/2010/04/27/books/27book.html (accessed May 20, 2010).
. "The Attack Coming From Bytes, Not Bombs."[bib-34] 2001. http://www.justice.gov/criminal/cybercrime/usamarch2001_4.htm (accessed May 26, 2010).
. "Computer Records and the Federal Rules of Evidence." U.S. Department of Justice, March[bib-35] Computer Forensics: Incident Response Essentials. Indianapolis: Addison-Wesley, 2002.
, and .[bib-36] Consistency Issue on Live Systems Forensics. The University of Hong Kong, 2009. http://www.cs.hku.hk/cisc/forensics/papers/Consistency.pdf (accessed June 15, 2010).
, , , and .[bib-37] Working with Computer Forensics Experts—Uncovering Data You Didn't Know Existed Can Help Make Your Case. Chicago: American Bar Association, July 2006.
.[bib-38] Live Forensic Acquisition as Alternative to Traditional Forensic Processes. Johannesburg: University of Johannesburg Academy for Information Technology, 2009.
, and .[bib-41] 2003. http://www.symantec.com/connect/articles/forensics-windows-platform-part-two (accessed June 11, 2010).
. "Forensics on the Windows Platform, Part Two." Symantec, February 11,[bib-42] National Center for Missing & Exploited Children. 2008 Annual Report. Alexandria, VA: National Center for Missing & Exploited Children, 2008. http://www.missingkids.com/en_US/publications/NC171.pdf (accessed May 20, 2010).
[bib-43] National Institute of Standards and Technology Boulder Laboratories. "General Information." NIST Boulder Laboratories. http://www.boulder.nist.gov/geninfo.htm (accessed June 11, 2010).
[bib-44] New Technologies, Inc. "Computer Evidence Defined." New Technologies, Inc., 2008. http://www.forensics-intl.com/def3.html (accessed June 11, 2010).
[bib-46] Cybercrime: The Internet as Crime Scene. Fort Campbell, KY: Austin Peay State University Center, 2005.
.[bib-47] ________. Digital Evidence Collection and Handling. Fort Campbell, KY: Austin Peay State University Center, 2006.
[bib-48] ________. Disaster Data Recovery and Computer Forensics. Fort Campbell, KY: Austin Peay State University, 2008.
[bib-49] The Investigator's Office and Laboratory. Des Moines, WA: Highline Community College, 2007.
.[bib-50] Information Systems Control Journal, Vol. 3, 2004. http://www.itgi.org/TemplateRedirect.cfm?template=/ContentManagement/ContentDisplay.cfm&ContentID=19 743 (accessed June 11, 2010).
. "An Investigation of Computer Forensics."[bib-51] Rehman Technology Services, Inc. Computers. Mount Dora, FL: Rehman Technology Services, Inc., 2005.
[bib-52] Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 2006. http://rcirib.ir/digital_books/PDF%20Books/Digital%20Crime%20And%20Forensic%20Science%20in%20Cyberspace-Panagiotis%20Kanellis-1591408725-Idea%20Group%20Pub.pdf (accessed June 15, 2010).
, and . In , , , and .[bib-53] An Explanation of Computer Forensics. Incline Village, NV: National Forensics Center, 2006.
.[bib-54] 2000. http://www.sei.cmu.edu/library/abstracts/news-at-sei/securitysum00.cfm (accessed May 20, 2010).
. "Cybersleuthing: Means, Motive, and Opportunity." Software Engineering Institute, June[bib-55] 1999. http://homes.cerias.purdue.edu/~mkr/hacker_doc.pdf (accessed May 20, 2010).
. "A New Hacker Taxonomy."[bib-57] Computer Security Incident Handling Guide. Gaithersburg, MD: National Institute of Standards and Technology, 2007.
, , and .[bib-59] Formalizing Computer Forensic Analysis: A Proof-Based Methodology. Raleigh, NC: North Carolina State University, Department of Computer Science, 2005.
.[bib-60] Symantec. "Cybercrime's Financial and Geographic Growth Shows No Slowdown during the Global Economic Crisis." Symantec, April 20, 2010. http://www.symantec.com/about/news/release/article.jsp?prid=20100419_02 (accessed May 20, 2010).
[bib-61] "Tracing Email." USUS: The Usually Useful Internet Guide for Journalists, 2005. http://www.usus.org/elements/tracing.htm (accessed June 15, 2010).
[bib-62] Computer Forensic Legal Standards and Equipment. SANS Institute InfoSec Reading Room, 2001.
.[bib-64] ________. "1999 Report on Cyberstalking: A New Challenge for Law Enforcement and Industry." USDOJ, February 7, 2003. http://www.justice.gov/criminal/cybercrime/cyberstalking.htm (accessed June 11, 2010).
[bib-65] ________. "Identity Theft." U.S. Department of Justice, n.d. http://www.justice.gov/criminal/fraud/websites/idtheft.html (accessed May 20, 2010).
[bib-66] U.S. Department of Labor. 2008-2009 Occupational Outlook Handbook. Indianapolis: JIST Publishing, 2008.
[bib-67] U.S. General Accounting Office. "Computer Attacks at Department of Defense Pose Increasing Risks." Washington, DC: GAO, May 1996. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks/dodattacks.html (accessed June 11, 2010).
[bib-68] U.S. Immigration and Customs Enforcement. "Cyber Crimes Center." U.S. Immigration and Customs Enforcement, April 13, 2010. http://www.ice.gov/partners/investigations/services/cyberbranch.htm (accessed June 11, 2010).
[bib-70] _________. The Essential Guide to Storage Area Networl<s. Upper Saddle River, NJ: Prentice Hall, 2002.
[bib-73] _________. Public Key Infrastructure: Building Trusted Applications and Web Services. Boca Raton, FL: Auerbach, 2004.
[bib-74] Firewalls: Jumpstart for Network and Systems Administrators. Burlington, MA: Elsevier Digital Press, 2005.
, and .[bib-76] Computer Forensics: Results of Live Response Inquiry vs. Memory Image Analysis. Pittsburgh: Carnegie Mellon University, Software Engineering Institute, 2008.
, , , and .[bib-77] Computer Forensics: Techniques for Catching the "Perp" Protect Company Data. Austin, TX: Publications & Communications, Inc., 2005.
.[bib-78] Jiefangjun Bao, February 2, 1999, p. 6.
. "Checking Information Warfare Epoch Mission of Intellectual Military."[bib-79] 2008. http://www.forensics-intl.com/art16.html (accessed June 11, 2010).
. "Processing Flash Memory Media." New Technologies, Inc.,