In the first edition of this book, we opened this chapter with these words: We have attempted, in this book, to offer a basic foundation for the professional practice of forensic computing. Our aim has been to put in place sufficient theory and good practice as to enable professionals to continue their development from a sound and confident starting point.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Birch, P. (2006) An Investigation of the Novell Netware Storage Services (NSS) 6 File Storage System, with a View to Establishing A Method of Forensically Capturing Data From Netware 6 NSS Volumes, MSc Thesis, Cranfield University.
Garfinkel, S. (1995) PGP - Pretty Good Privacy, O’Reilly & Associates Inc., San Francisco.
Gutmann, P. (1996) Secure deletion of data from magnetic and solid-state memory, Sixth USENIX Security Symposium Proceedings, San Jose, CA, 22-25 July. See also www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
Oechslin, P. (2005) Password Cracking: Rainbow Tables Explained, The International Infor-mation Systems Security Certification Consortium, Mar-Apr 2005 Newsletter. URL: https://www.isc2.org/cgi-bin/content.cgi?page=738.
Schneier, B. (1996) Applied Cryptography, Protocols, Algorithms and Source Code in C, John Wiley & Sons, New York.
Rights and permissions
Copyright information
© 2007 Springer-Verlag London Limited
About this chapter
Cite this chapter
(2007). Looking Ahead (Just a Little Bit More). In: Forensic Computing. Springer, London. https://doi.org/10.1007/978-1-84628-732-9_9
Download citation
DOI: https://doi.org/10.1007/978-1-84628-732-9_9
Publisher Name: Springer, London
Print ISBN: 978-1-84628-397-0
Online ISBN: 978-1-84628-732-9
eBook Packages: Computer ScienceComputer Science (R0)