Digital Forensics and Born-Digital Content in Cultural Heritage Collections. CLIR Publication No. 149.
暂无分享,去创建一个
[1] Michael Sheetz. Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers , 2007 .
[2] Michael Joyce. Afternoon, A Story , 1990 .
[3] Amber Schroader,et al. Alternate Data Storage Forensics , 2007 .
[4] Caroline Williams,et al. Trusting Records: Legal, Historical and Diplomatic Perspectives , 2002, J. Documentation.
[5] Donald H. Reiman. Bibliography and the sociology of texts. (The Panizzi Lectures, 1985.). D. F. McKenzie , 1990 .
[6] Elizabeth Diamond,et al. The Archivist as Forensic Scientist: Seeing Ourselves in a Different Way , 1994 .
[7] Jerome McGann,et al. The Textual Condition , 2020 .
[8] Michelle Light,et al. Colophons and Annotations: New Directions for the Finding Aid , 2007 .
[9] Susan Hamburger,et al. The State of Digital Preservation: An International Perspective , 2003 .
[10] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..
[11] D. P. Bergeron,et al. Dark Ages II: When the Digital Data Die , 2001 .
[12] D. Greetham,et al. The Pleasures of Contamination: Evidence, Text, and Voice in Textual Studies , 2010 .
[13] Viktor Mayer-Schönberger,et al. Delete: The Virtue of Forgetting in the Digital Age , 2009 .
[14] Abraham Silberschatz,et al. Operating System Concepts , 1983 .
[15] Allyson Mower. Working Together or Apart: Promoting the Next Generation of Digital Scholarship (review) , 2009 .
[16] Matthew G. Kirschenbaum,et al. Approaches to Managing and Collecting Born-Digital Literary Materials for Scholarly Use , 2009 .
[17] Jack Wiles,et al. The Best Damn Cybercrime and Digital Forensics Book Period , 2007 .
[18] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[19] Steve Bunting,et al. EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide , 2006 .
[20] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[21] George Eckel. Inside Windows NT , 1993 .
[22] Gary C. Kessler,et al. Computer Forensics: Principles and Practices , 2006 .
[23] Catherine C. Marshall,et al. From writing and analysis to the repository: taking the scholars' perspective on scholarly archiving , 2008, JCDL '08.
[24] Matthew G. Kirschenbaum,et al. Mechanisms: New Media and the Forensic Imagination , 2007 .
[25] Robert Slade. Software Forensics : Collecting Evidence from the Scene of a Digital Crime , 2004 .
[26] Hal Abelson,et al. Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion , 2008 .
[27] Mark Pollitt,et al. Advances in Digital Forensics , 2006 .
[28] Michael A. Caloyannides. Computer Forensics and Privacy , 2001 .
[29] D. Levy. Scrolling Forward: Making Sense of Documents in the Digital Age , 2001 .
[30] Jerome P. McDonough,et al. Preserving Virtual Worlds Final Report , 2010 .
[31] Eleanor Lawrence,et al. Future in the past , 1975, Nature.
[32] R. Jones,et al. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 2003, Int. J. Law Inf. Technol..
[33] Wally Wang,et al. Steal This Computer Book: What They Won't Tell you About the Internet , 1998 .
[34] D. Bearman. Electronic Evidence: Strategies for Managing Records in Contemporary Organizations , 1994 .
[35] D. Rubinfeld. Sustainable Economics for a Digital Planet: Ensuring Long-term Access to Digital Information , 2010 .
[36] John M. Silvester,et al. The Social Life of Information: Brown, J.S., & Duguid, P. (2000). Cambridge, MA: Harvard Business School Publishing. ISBN 0-87584-762-5. 320 pages , 2000, Internet High. Educ..
[37] Seamus Ross,et al. The Data Audit Framework: a toolkit to identify research assets and improve data management in research led institutions , 2008, iPRES.
[38] Clifford Stoll,et al. The Cuckoo's Egg , 1989 .
[39] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[40] Chris Davis,et al. Hacking Exposed Computer Forensics: Secrets & Solutions , 2004 .
[41] Sarah Higgins. PREMIS Data Dictionary for Preservation Metadata , 2009 .
[42] Elizabeth Shepherd. Electronic Records in the Manuscript Repository , 2010, J. Assoc. Inf. Sci. Technol..
[43] Seamus Ross,et al. Digital Archaeology: Rescuing Neglected and Damaged Data Resources: A JISC/NPO Study within the Electronic Libraries (eLib) Programme on the Preservation of Electronic Materials , 1999 .
[44] Albert Marcella,et al. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , 2002 .
[45] Mark A. Greene,et al. More Product, Less Process: Revamping Traditional Archival Processing , 2007 .
[46] Joe Nickell,et al. Crime Science: Methods of Forensic Detection , 1998 .
[47] Charles Petzold. Code: The Hidden Language of Computer Hardware and Software , 1999 .
[48] Bram Lohman,et al. Emulation for digital preservation in practice: the results , 2007, iPRES.
[49] Frederick R. Byers. Care and handling of CDs and DVDs: A guide for librarians and archivists , 2003 .
[50] John R. Garrett,et al. Avoiding Technological Quicksand : Finding a Viable Technical Foundation for Digital Preservation , 2009 .
[51] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[52] Luciana Duranti,et al. Diplomatics: New Uses for an Old Science , 1998 .
[53] L. Duranti. From Digital Diplomatics to Digital Records Forensics , 2010 .
[54] John Garrett,et al. Preserving Digital Information. Report of the Task Force on Archiving of Digital Information. , 1996 .
[55] Christine A. Finn. Artifacts : an archaeologist's year in Silicon Valley , 2001 .
[56] Catherine C. Marshall,et al. Rethinking Personal Digital Archiving, Part 2: Implications for Services, Applications, and Institutions , 2008, D Lib Mag..
[57] Miriam B. Kahn. Disaster Response and Planning for Libraries 3rd ed. , 2012 .
[58] Priscilla Finley,et al. A Better Pencil: Readers, Writers, and the Digital Revolution , 2010 .
[59] W. Noyes. United Nations Educational, Scientific and Cultural Organization , 1946, International Organization.
[60] Craig S. Wright,et al. Overwriting Hard Drive Data: The Great Wiping Controversy , 2008, ICISS.
[61] W. Daniel Hillis,et al. The Pattern on the Stone: The Simple Ideas That Make Computers Work , 1999 .
[62] Seamus Ross,et al. Bringing Self-assessment Home: Repository Profiling and Key Lines of Enquiry within DRAMBORA , 2008, Int. J. Digit. Curation.
[63] William Bradley Glisson. Use of computer forensics in the digital curation of removable media , 2009 .
[64] Carolyn Steedman,et al. Dust: The Archive and Cultural History , 2001 .
[65] Heather MacNeil,et al. Trusting Records: Legal, Historical and Diplomatic Perspectives , 2000 .
[66] F. Gerald Ham,et al. Selecting and Appraising Archives and Manuscripts , 1993 .
[67] Keith J. Jones,et al. Real Digital Forensics: Computer Security and Incident Response , 2005 .
[68] B. H. Leneyr. Authenticity in a Digital Environment , 2012 .
[69] Bill Nelson,et al. Guide to Computer Forensics and Investigations , 2003 .
[70] William Von Hagen. Linux Filesystems , 2002 .
[71] Catherine C. Marshall,et al. Rethinking Personal Digital Archiving, Part 1: Four Challenges from the Field , 2008, D Lib Mag..
[72] Ordway Hilton,et al. Scientific Examination Of Questioned Documents , 1992 .
[73] Dan Farmer,et al. Forensic Discovery , 2004 .