Towards Fact-Based Digital Forensic Evidence Collection Methodology
暂无分享,去创建一个
[1] Alan T. Sherman,et al. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..
[2] Sarah Mocas,et al. Building theoretical underpinnings for digital forensics research , 2004, Digit. Investig..
[3] Dan Farmer,et al. Forensic Discovery , 2004 .
[4] Gary C. Kessler,et al. Computer Forensics: Principles and Practices , 2006 .
[5] John Liederbach,et al. Digital Crime and Digital Terrorism , 2005 .
[6] Michael Ligh,et al. Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code , 2010 .
[7] Harlan Carvey,et al. Digital Forensics with Open Source Tools , 2011 .
[8] Jack Wiles,et al. The Best Damn Cybercrime and Digital Forensics Book Period , 2007 .
[9] Douglas Schweitzer. Incident Response: Computer Forensics Toolkit , 2003 .
[10] Rhonda Delmater,et al. Data Mining Explained: A Manager's Guide to Customer-Centric Business Intelligence , 2001 .
[11] Alan T. Sherman,et al. UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO HYPOTHETICAL CASE STUDIES , 2011 .
[12] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[13] Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data , 2010 .
[14] Amy S. Jackson. Book Review: Digital Forensics and Born-Digital Content in Cultural Heritage Collections , 2011 .
[15] Karuppannan Jaishankar,et al. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations , 2012 .
[16] Katharina Wagner,et al. Digital Evidence And Computer Crime Forensic Science Computers And The Internet , 2016 .
[17] I. Walden. Computer crimes and digital investigations , 2007 .
[18] Keith J. Jones,et al. Real Digital Forensics: Computer Security and Incident Response , 2005 .
[19] Albert Marcella,et al. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , 2002 .
[20] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[21] Bill Nelson,et al. Guide to Computer Forensics and Investigations , 2003 .
[22] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[23] Eric Mayer. Scene Of The Cybercrime Computer Forensics Handbook , 2016 .