Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
13.5 References
Rubin, Richard. “More Distancing and the Use of Information: The Seven Temptations.” In Joseph M. Kizza. Social and Ethical Effects of the Computer Revolution. 1996. McFarland & Company, Jefferson, NC..
Kruse II, Warren and Jay, G. Heiser. Computer Forensics: Incident Response Essentials. Reading: MA., Addison-Wesley, 2002.
Berghel, Hal. “The Discipline of Internet Forensics,” Communications of the ACM, August 2003. Vol. 46, No. 8.
“Intrusion Analysis.” http://www.crucialsecurity.com/intrusionanalysis.html
Northcutt, Stephen, Mark Cooper, Matt Fearnow, and Karen Fredrick. Intrusion Signatures and Analysis. New Riders Publishing. Indianapolis, IN, 2001.
Bender, W., D. Gruhl, N. Morimoto, and A. Lu. “Techniques for data hiding“. IBM Systems Journal, Vol. 35, Nos. 3&4, 1996
Pipkin, Donald, L. Information Security: Protecting the Global Enterprise. Prentice Hall PTR. Upper Saddle River, NJ. 2000.
Sammes, Tony and Brian Jenkinson. Forensic Computing: A Practitioner's Guide. Springer, London, 2000.
CERT/CC Statistics 1988–2003. http://www.cert.org/stats/cert_stats.html
InterGov International. International Web Police. http://www.intergov.org/public_information/general_information/latest_web_stats.html
“Symantec Knowledge Base.” http://service2.symantec.com/SUPPORT/ghost.nsf/
TekTron. “Computer Forensics.” http://www.tektronsolutions.com/computerforensics.htm
Nelson, Bill, Amelia Phillips, Frank Enfinger, and Chris Steuart. Guide to Computer Forensics and Investigations. Boston, MA: Course Technologies, 2004.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Computer and Network Forensics. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_13
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)