Digital Evidence and Computer Crime, Second Edition
Buckeye B. and Liston K. (2002) "Recovering Deleted Files in Linux", February 2002, Sysadmin Magazine. (Available online at http://www.samag.com/documents/s=7033/sam0204g/sam0204g.htm).
Carrier B. (2003a) "Splitting The Disk - Part 1", Sleuth Kit Informer, Issue #2, March 15, 2003 (Available online at http://www.sleuthkit.org/informer/sleuthkit-informer-2.html).
Carrier B. (2003b) "Splitting The Disk - Part 2", Sleuth Kit Informer, Issue #5, July 15, 2003 (Available online at http://www.sleuthkit.org/informer/sleuthkit-informer-5.html).
Peek J.,O'Reilly T. and Loukides M. (1997) Unix Powertools, California: O'Reilly.
Seglem K.,Luque M. E. and Murphy S. E. (2001) Forensic Analysis of UNIX Systems, Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press.
Widdowson L. and Ferlito J. (2001) "Tales from the Abyss: UNIX File Recovery", January 2001, SysAdmin Magazine (Available online at http://www.samag.com/documents/s=1441/sam0111b/0111b.htm).
Категории