Skip to main content

Computer and Network Forensics

  • Chapter
Book cover Computer Network Security

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

13.5 References

  1. Rubin, Richard. “More Distancing and the Use of Information: The Seven Temptations.” In Joseph M. Kizza. Social and Ethical Effects of the Computer Revolution. 1996. McFarland & Company, Jefferson, NC..

    Google Scholar 

  2. Kruse II, Warren and Jay, G. Heiser. Computer Forensics: Incident Response Essentials. Reading: MA., Addison-Wesley, 2002.

    Google Scholar 

  3. Berghel, Hal. “The Discipline of Internet Forensics,” Communications of the ACM, August 2003. Vol. 46, No. 8.

    Google Scholar 

  4. “Intrusion Analysis.” http://www.crucialsecurity.com/intrusionanalysis.html

    Google Scholar 

  5. Northcutt, Stephen, Mark Cooper, Matt Fearnow, and Karen Fredrick. Intrusion Signatures and Analysis. New Riders Publishing. Indianapolis, IN, 2001.

    Google Scholar 

  6. Bender, W., D. Gruhl, N. Morimoto, and A. Lu. “Techniques for data hiding“. IBM Systems Journal, Vol. 35, Nos. 3&4, 1996

    Google Scholar 

  7. Pipkin, Donald, L. Information Security: Protecting the Global Enterprise. Prentice Hall PTR. Upper Saddle River, NJ. 2000.

    Google Scholar 

  8. Sammes, Tony and Brian Jenkinson. Forensic Computing: A Practitioner's Guide. Springer, London, 2000.

    Google Scholar 

  9. CERT/CC Statistics 1988–2003. http://www.cert.org/stats/cert_stats.html

    Google Scholar 

  10. InterGov International. International Web Police. http://www.intergov.org/public_information/general_information/latest_web_stats.html

    Google Scholar 

  11. “Symantec Knowledge Base.” http://service2.symantec.com/SUPPORT/ghost.nsf/

    Google Scholar 

  12. TekTron. “Computer Forensics.” http://www.tektronsolutions.com/computerforensics.htm

    Google Scholar 

  13. Nelson, Bill, Amelia Phillips, Frank Enfinger, and Chris Steuart. Guide to Computer Forensics and Investigations. Boston, MA: Course Technologies, 2004.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

(2005). Computer and Network Forensics. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_13

Download citation

  • DOI: https://doi.org/10.1007/0-387-25228-2_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-20473-4

  • Online ISBN: 978-0-387-25228-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics