Digital Evidence and Computer Crime, Second Edition

Fyodor (1998) "Remote OS detection via TCP/IP Stack FingerPrinting", (Available online at http://www.insecure.org/nmap/nmap-fingerprinting-article.txt)

Romig S. (2001) "Incident Response Tools", Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press

Sommer P. (1997) "Downloads, Logs and Captures: Evidence from Cyberspace", Journal of Financial Crime, October, 1997, 5JFC2 138–152, (Available online at http://www1.bcs.org.uk/DocsRepository/03900/3968/logs.htm)

United States Department of Justice (2002) "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations" (Available online at http://www.cybercrime.gov/searchmanual.htm)

Категории