X hits on this document

PDF document

Hassel Stacy Jr. Dr. Philip Lunsford ICTN4040 601 04/16/06 - page 7 / 8

21 views

0 shares

0 downloads

0 comments

7 / 8

Stacy 7

REFERENCES

Leigland Ryan, Krings Axel W., “A Formation of Digital Forensics”, International Journal of Digital Evidence”, Fall 2004, Volume 3, Issue 2 http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B8472C-D1D2-8F98- 8F7597844CF74DF8.pdf

Harrison Warren, Aucsmith David, Heuston George, Mocas Sarah, Morrisey Mark, Russell Steve, “A Lessons Repository for Computer Forensics”, International Journal of Digital Evidence, Fall 2002, Volume 1, Issue 3 * http://www.utica.edu/academic/institutes/ecii/publications/articles/A049D6C7-93E9-51F2- A468BF90038985DB.pdf

Radcliff Deborah, “Cybersleuthing solves the case” Computerworld, 14 January 2002 http://www.computerworld.com/securitytopics/security/story/0,10801,67299,00.html

Carrier Brian D., Spafford Eugene H., “Defining Event Reconstruction of Digital Crime Scenes”, CERIAS Tech Report 2004-37 https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/archive/2004-37.pdf

US Department of Justice, “Electronic Crime Scene Investigation, A Guide To First Responders” http://www.ncjrs.gov/pdffiles1/nij/187736.pdf

The Computer Fraud and Abuse Act http://www.panix.com/~eck/computer-fraud-act.html

The USA Patriot Act http://www.epic.org/privacy/terrorism/usapatriot/default.html

Richard III Golden G., Roussev Vassil, “Next-Generation Digital Forensics”, Communications of the ACM, February 2006, Volume 49, No. 2 * http://portal.acm.org/citation.cfm?id=1113034.1113074&coll=GUIDE&dl=GUIDE&idx=J79&part=pe riodical&WantType=periodical&title=Communications%20of%20the%20ACM

Carrier Brian D., “Risks of Live Digital Forensic Analysis”, Communications of the ACM, February 2006, Volume 49, No. 2 http://portal.acm.org/citation.cfm?id=1113034.1113069&coll=GUIDE&dl=GUIDE&idx=J79&part=pe riodical&WantType=periodical&title=Communications%20of%20the%20ACM

Casey Eoghan, “Investigating Sophisticated Security Breaches”, Communications Of The ACM, February 2006, Volume 49, No. 2 http://www.strozllc.com/docs/pdf/Casey-CACM-Sophisticated-Intruders.pdf

Schweitzer Douglas, “Incident Response” Wiley Publishing Inc., 2003

Document info
Document views21
Page views21
Page last viewedFri Dec 09 06:21:28 UTC 2016
Pages8
Paragraphs144
Words1854

Comments