References

[bib-01] Rebecca Bace,. An Introduction to Intrusion Detection Assessment. Herndon, VA: ICSA Labs, 2005.

[bib-02] Hal Berghel,. Hiding Data, Forensics and Anti-Forensics. Berghel.net, 2007.

[bib-03] Hal Berghel,, David Hoelzer, and Michael Sthultz. "Data Hiding Tactics for Windows and UNIX File Systems." Identity Theft and Financial Fraud Research and Operation Center, May 26, 2006. http://www.berghel.net/publications/data_hiding/data_hiding.php (accessed June 1, 2010).

[bib-04] Scott Berinato,. "The Rise of Anti-Forensics." CSO, June 8, 2007. http://www.csoonline.com/article/221208/The_Rise_of_Anti_Forensics (accessed May 20, 2010).

[bib-05] Maggie Biggs,. "Forensics Tools Can Help Stop Threats to Ever-Expanding Networks." Government Computer News, August 19, 2009. http://gcn.com/articles/2009/08/24/it-forensics-tools-tech-strategies.aspx (accessed June 15, 2010).

[bib-06] Andrew J. Blumberg,, and Peter Eckersley. "On Locational Privacy, and How to Avoid Losing It Forever." Electronic Frontier Foundation, August 2009. http://www.eff.org/files/eff-locational-privacy.pdf (accessed June 11, 2010).

[bib-07] Bill Blunden,. The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System. Boston: Wordware Publishing, Inc., 2009, pp. 496-498.

[bib-08] Matthew Braid,. Collecting Electronic Evidence After a System Compromise. Bethesda, MD: The SANS Institute, 2005.

[bib-09] Michael W Burnette,. "Forensic Examination of a RIM (BlackBerry) Wireless Device." June 2002. http://www.rh-law.com/ediscovery/Blackberry.pdf (accessed June 11, 2010).

[bib-10] Brian D. Carrier,, and Eugene H. Spafford. An Event-Based Digital Forensic Investigation Framework. West Lafayette, IN: Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University. Presented at DFRWS 2004.

[bib-11] CBS News. "Cyberbully Mom Guilty of Lesser Charge." CBS News, November 26, 2008. http://www.cbsnews.com/stories/2008/11/26/national/main4635346.shtml (accessed May 14, 2010).

[bib-12] W. Jerry Chisum,, and Brent E. Turvey. "Evidence Dynamics: Locard's Exchange Principle and Crime Reconstruction." Journal of Behavioral Profiling Vol. 1, No. 1, January 2000.

[bib-13] Anton Chuvakin,. "Linux Data Hiding and Recovery." Guardian Digital, Inc., 2010. http://www.linuxsecurity.com/content/view/117638/49/ (accessed May 21, 2010).

[bib-14] Richard A. Clarke,, and K. Knake Robert. Cyberwar: The Next Threat to National Security and What to Do About It. New York: HarperCollins, 2010.

[bib-15] Committee on Identifying the Needs of the Forensic Sciences Community and National Research Council. Strengthening Forensic Science in the United States: A Path Forward. Washington, DC: National Academies Press, 2009, pp. 5-41.

[bib-16] Computer Forensic Services. Data Analysis & Recovery. Minnetonka, MN: Computer Forensic Services, Inc., 2006.

[bib-17] "Computer Forensics Recruiter Provides Career Information in the Computer Forensics Field with the Best and Latest Education Resources and Schools." Information Engineer Technology News, March 7, 2010. http://www.informationengineer.org/2010/03/06/computer-forensics-recruiter-provides-career-information-in-the-computer-forensics-field-with-the-best-and -latest-education-resources-and-schools.html (accessed July 8, 2009).

[bib-18] Computer Forensics UK Ltd. DIVA Computer Evidence—Digital Image Verification and Authentication. Warwickshire, England: Computer Forensics UK Ltd., 2005.

[bib-19] Kenneth Corbin,. "Massive Cyber Spy Ring Seen Operating in China." Internetnews.com, April 8, 2010. http://www.internetnews.com/security/article.php/3875471/Massive-Cyber-Spy-Ring-Seen-Operating-in-China.htm (accessed June 11, 2010).

[bib-20] ________. "Report Alleges Vast Cyber Crime Syndicate in China." eSecurity Planet, April 7, 2010. http://www.esecurityplanet.com/news/article.php/3875281/Report-Alleges-Vast-Cyber-Crime-Syndicate-in-China.htm (accessed May 14, 2010).

[bib-21] Cornell University Law School. Computer Fraud and Abuse Act. Cornell University Law School, January 5, 2009. http://www.law.cornell.edu/uscode/18/1030.html (accessed June 11, 2010).

[bib-22] Larry Dignan,. "How Databases Connect to the Arrest of Faisal Shahzad." Tech Republic, May 4, 2010. http://blogs.techrepublic.com.com/datacenter/?p=2579&tag=nl.e040 (accessed May 20, 2010).

[bib-23] Economy Watch. "Porn Industry, Porn Trade, Adult Entertainment Industry." Economy Watch, n.d. http://www.economywatch.com/world-industries/porn-industry.html (accessed May 20, 2010).

[bib-24] Federal Bureau of Investigation. 2008 Computer Crime and Security Survey. Washington, DC: FBI, 2008.

[bib-25] Andreas Grytting Furuseth,. Digital Forensics: Methods and Tools for Retrieval and Analysis of Security Credentials and Hidden Data. Trondheim, Norway: Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://pogostick.net/~andreas/ (accessed June 14, 2010).

[bib-26] Derek Gamradt,. Data Backup + Recovery. Englewood, CO: StorNet, 2005.

[bib-27] Robert Graham,. "FAQ: Firewall Forensics (What Am I Seeing?)," version 0.3.0. LinuxSecurity.com, January 15, 2000. http://www.linuxsecurity.com/resource_files/firewalls/firewall-seen.html (accessed June 11, 2010).

[bib-28] Alberto R. Gonzalez,, B. Schofield Regina, and W. Hagy David. Investigations Involving the Internet and Computer Networks, NCJ 210798. Washington, DC: U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, January 2007. http://www.ncjrs.gov/pdffiles1/nij/210798.pdf (accessed June 15, 2010).

[bib-29] Tom Grubb,. "The Five As That Make Cybercrime so Attractive." Security Week, April 26, 2010. http://www.securityweek.com/content/five-a%E2%80%99s-make-cybercrime-so-attractive (accessed May 14, 2010).

[bib-30] Susan Hansche,, Berti John, and Hare Chris. Official (ISC)2 Guide to the CISSP Exam. Prattville, AL: (ISC)2, 2003.

[bib-31] Andrew Hoog,, and Gaffaney Kyle. "iPhone Forensics." viaForensics, June 2009. http://viaforensics.com/services/iphone-forensics/ (accessed June 11, 2010).

[bib-32] Internet Crime Complaint Center (IC3). "2009 Internet Crime Report." Internet Crime Complaint Center, n.d. http://www.ic3.gov/media/annualreports.aspx (access June 11, 2010).

[bib-33] Michiko Kakutani,. "The Attack Coming From Bytes, Not Bombs." The New York Times, April 26, 2010. http://www.nytimes.com/2010/04/27/books/27book.html (accessed May 20, 2010).

[bib-34] Orin S Kerr,. "Computer Records and the Federal Rules of Evidence." U.S. Department of Justice, March 2001. http://www.justice.gov/criminal/cybercrime/usamarch2001_4.htm (accessed May 26, 2010).

[bib-35] Warren G. Kruse,, and G. Heiser Jay. Computer Forensics: Incident Response Essentials. Indianapolis: Addison-Wesley, 2002.

[bib-36] Frank Y. W. Law,, K. P. Chow, Michael Y. K. Kwan, and Pierre K. Y. Lai. Consistency Issue on Live Systems Forensics. The University of Hong Kong, 2009. http://www.cs.hku.hk/cisc/forensics/papers/Consistency.pdf (accessed June 15, 2010).

[bib-37] Jiyun Cameron Lee,. Working with Computer Forensics Experts—Uncovering Data You Didn't Know Existed Can Help Make Your Case. Chicago: American Bar Association, July 2006.

[bib-38] Marthie Lessing,, and Basie von Solms. Live Forensic Acquisition as Alternative to Traditional Forensic Processes. Johannesburg: University of Johannesburg Academy for Information Technology, 2009.

[bib-39] Rodney McKemmish,, quoted in Indrajit Ray,, and Sujeet Shenoi. Advances in Digital Forensics IV Boston: Springer, 2008, pp. 3-15.

[bib-40] Microsoft. Responding to IT Security Incidents. Redmond, WA: Microsoft Corporation, 2007.

[bib-41] Jamie Morris,. "Forensics on the Windows Platform, Part Two." Symantec, February 11, 2003. http://www.symantec.com/connect/articles/forensics-windows-platform-part-two (accessed June 11, 2010).

[bib-42] National Center for Missing & Exploited Children. 2008 Annual Report. Alexandria, VA: National Center for Missing & Exploited Children, 2008. http://www.missingkids.com/en_US/publications/NC171.pdf (accessed May 20, 2010).

[bib-43] National Institute of Standards and Technology Boulder Laboratories. "General Information." NIST Boulder Laboratories. http://www.boulder.nist.gov/geninfo.htm (accessed June 11, 2010).

[bib-44] New Technologies, Inc. "Computer Evidence Defined." New Technologies, Inc., 2008. http://www.forensics-intl.com/def3.html (accessed June 11, 2010).

[bib-45] ________. Computer Evidence Processing Steps. Gresham, OR: New Technologies, Inc., 2005.

[bib-46] Thomas R O'Connor,. Cybercrime: The Internet as Crime Scene. Fort Campbell, KY: Austin Peay State University Center, 2005.

[bib-47] ________. Digital Evidence Collection and Handling. Fort Campbell, KY: Austin Peay State University Center, 2006.

[bib-48] ________. Disaster Data Recovery and Computer Forensics. Fort Campbell, KY: Austin Peay State University, 2008.

[bib-49] Amelia Phillips,. The Investigator's Office and Laboratory. Des Moines, WA: Highline Community College, 2007.

[bib-50] Ryan Pidanick,. "An Investigation of Computer Forensics." Information Systems Control Journal, Vol. 3, 2004. http://www.itgi.org/TemplateRedirect.cfm?template=/ContentManagement/ContentDisplay.cfm&ContentID=19 743 (accessed June 11, 2010).

[bib-51] Rehman Technology Services, Inc. Computers. Mount Dora, FL: Rehman Technology Services, Inc., 2005.

[bib-52] Golden Richard III,, and Vassil Roussev. In Kanellis, Panagiotis, Evangelos Kiountouzis, Nicholas Kolokotronis, and Drakoulis Martakos. Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 2006. http://rcirib.ir/digital_books/PDF%20Books/Digital%20Crime%20And%20Forensic%20Science%20in%20Cyberspace-Panagiotis%20Kanellis-1591408725-Idea%20Group%20Pub.pdf (accessed June 15, 2010).

[bib-53] Judd Robbins,. An Explanation of Computer Forensics. Incline Village, NV: National Forensics Center, 2006.

[bib-54] Larry Rogers,. "Cybersleuthing: Means, Motive, and Opportunity." Software Engineering Institute, June 2000. http://www.sei.cmu.edu/library/abstracts/news-at-sei/securitysum00.cfm (accessed May 20, 2010).

[bib-55] Marc Rogers,. "A New Hacker Taxonomy." 1999. http://homes.cerias.purdue.edu/~mkr/hacker_doc.pdf (accessed May 20, 2010).

[bib-56] Marcia Savage,. "CSI for the CISO." Information Security, Vol. 10, No. 8, September 2007.

[bib-57] Karen Scarfone,, Tim Grance, and Kelly Masone. Computer Security Incident Handling Guide. Gaithersburg, MD: National Institute of Standards and Technology, 2007.

[bib-58] Peter Sommer,. Computer Forensics: An Introduction. London: Virtual City Associates, 2003.

[bib-59] Joseph C Sremack,. Formalizing Computer Forensic Analysis: A Proof-Based Methodology. Raleigh, NC: North Carolina State University, Department of Computer Science, 2005.

[bib-60] Symantec. "Cybercrime's Financial and Geographic Growth Shows No Slowdown during the Global Economic Crisis." Symantec, April 20, 2010. http://www.symantec.com/about/news/release/article.jsp?prid=20100419_02 (accessed May 20, 2010).

[bib-61] "Tracing Email." USUS: The Usually Useful Internet Guide for Journalists, 2005. http://www.usus.org/elements/tracing.htm (accessed June 15, 2010).

[bib-62] Damian Tsoutsouris,. Computer Forensic Legal Standards and Equipment. SANS Institute InfoSec Reading Room, 2001.

[bib-63] U.S. Department of Justice. http://www.justice.gov (accessed June 13, 2010).

[bib-64] ________. "1999 Report on Cyberstalking: A New Challenge for Law Enforcement and Industry." USDOJ, February 7, 2003. http://www.justice.gov/criminal/cybercrime/cyberstalking.htm (accessed June 11, 2010).

[bib-65] ________. "Identity Theft." U.S. Department of Justice, n.d. http://www.justice.gov/criminal/fraud/websites/idtheft.html (accessed May 20, 2010).

[bib-66] U.S. Department of Labor. 2008-2009 Occupational Outlook Handbook. Indianapolis: JIST Publishing, 2008.

[bib-67] U.S. General Accounting Office. "Computer Attacks at Department of Defense Pose Increasing Risks." Washington, DC: GAO, May 1996. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/risks/dodattacks.html (accessed June 11, 2010).

[bib-68] U.S. Immigration and Customs Enforcement. "Cyber Crimes Center." U.S. Immigration and Customs Enforcement, April 13, 2010. http://www.ice.gov/partners/investigations/services/cyberbranch.htm (accessed June 11, 2010).

[bib-69] John R Vacca,. Computer and Information Security Handbook. Burlington, MA: Morgan Kaufmann, 2009.

[bib-70] _________. The Essential Guide to Storage Area Networl<s. Upper Saddle River, NJ: Prentice Hall, 2002.

[bib-71] _________. Guide to Wireless Network Security. Philadelphia: Springer, 2006.

[bib-72] _________. Practical Internet Security. New York: Springer, 2006.

[bib-73] _________. Public Key Infrastructure: Building Trusted Applications and Web Services. Boca Raton, FL: Auerbach, 2004.

[bib-74] John R. Vacca,, and Scott R. Ellis. Firewalls: Jumpstart for Network and Systems Administrators. Burlington, MA: Elsevier Digital Press, 2005.

[bib-75] Vogon International Limited. Vogon Forensics Bulletin, Vol. 3, Issue 3, 2001.

[bib-76] Cal Waits,, Joseph Ayo Akinyele, Richard Nolan, and Larry Rogers. Computer Forensics: Results of Live Response Inquiry vs. Memory Image Analysis. Pittsburgh: Carnegie Mellon University, Software Engineering Institute, 2008.

[bib-77] Don Walker,. Computer Forensics: Techniques for Catching the "Perp" Protect Company Data. Austin, TX: Publications & Communications, Inc., 2005.

[bib-78] Shen Weiguand,. "Checking Information Warfare Epoch Mission of Intellectual Military." Jiefangjun Bao, February 2, 1999, p. 6.

[bib-79] Fred J Wiechmann,. "Processing Flash Memory Media." New Technologies, Inc., 2008. http://www.forensics-intl.com/art16.html (accessed June 11, 2010).

[bib-80] WikiSTC. "Alternate Data Streams." WikiSTC, 2006. http://www.wikistc.org/wiki/Alternate_data_streams (accessed June 13, 2010).

[bib-81] Andrzej Zwaniecki,. "Low-Risk, High-Profit Opportunities Drive Up Cybercrime." U.S. Department of State, September 28, 2009. http://www.america.gov/st/peacesec-english/2009/September/20090921193606saikceinawz0.926037.html (accessed May 14, 2010).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset