A hierarchical, objectives-based framework for the digital investigations process
暂无分享,去创建一个
[1] George M. Mohay,et al. Computer and Intrusion Forensics , 2003 .
[2] Robert Rowlingson,et al. A Ten Step Process for Forensic Readiness , 2004, Int. J. Digit. EVid..
[3] Eoghan Casey,et al. Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2001 .
[4] Brian D. Carrier. Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers , 2003, Int. J. Digit. EVid..
[5] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[6] Bill Nelson,et al. Guide to Computer Forensics and Investigations, Second Edition , 2005 .
[7] Seamus O. Ciardhuáin,et al. An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..
[8] John R. Vacca,et al. Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series) , 2005 .
[9] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[10] Y. Lacasse,et al. From the authors , 2005, European Respiratory Journal.
[11] Kevin Mandia,et al. Incident Response & Computer Forensics , 2003 .
[12] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[13] Bill Nelson,et al. Guide to Computer Forensics and Investigations , 2003 .
[14] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[15] Gary L. Palmer. Forensic Analysis in the Digital World , 2002, Int. J. Digit. EVid..