Bibliography

Brenner, Susan, Brian Carrier, and Jef Henninger. "The Trojan Defense in Cybercrime Cases." Santa Clara Computer and High Technology Law Journal, 21(1), 2004.

Bejtlich, Richard. The Tao of Network Security Monitoring: Beyond Intrusion Detection. Boston: Addison Wesley, 2005.

Carrier, Brian. "Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers." International Journal of Digital Evidence, Winter 2003a. http://www.ijde.org.

Carrier, Brian. "Open Source Digital Forensic Tools: The Legal Argument." Fall 2003b. http://www.digital-evidence.org.

Carrier, Brian, and Eugene H. Spafford. "Getting Physical with the Digital Investigation Process." International Journal of Digital Evidence, Fall 2003. http://www.ijde.org.

Casey, Eoghan. Digital Evidence and Computer Crime. 2nd ed. London: Academic Press, 2004.

Clifford, Ralph, ed. Cybercrime: The Investigation, Prosecution, and Defense of a Computer-Related Crime. Durham: Carolina Academic Press, 2001.

George, Esther. "UK Computer Misuse ActThe Trojan Virus Defense." Journal of Digital Investigation, 1(2), 2004.

The Honeynet Project. Know Your Enemy. 2nd ed. Boston: Addison-Wesley, 2004.

Houghton Mifflin Company. The American Heritage Dictionary. 4th ed. Boston: Houghton Mifflin, 2000.

Mandia, Kevin, Chris Prosise, and Matt Pepe. Incident Response and Computer Forensics. 2nd ed. Emeryville: McGraw Hill/Osborne, 2003.

Schneier, Bruce. Applied Cryptography. 2nd ed. New York: Wiley Publishing, 1995.

Категории